[HTML][HTML] Security and privacy of electronic health records: Concerns and challenges
Abstract Electronic Medical Records (EMRs) can provide many benefits to physicians,
patients and healthcare services if they are adopted by healthcare organizations. But …
patients and healthcare services if they are adopted by healthcare organizations. But …
Artificial intelligence analysis in cyber domain: A review
L Zhao, D Zhu, W Shafik… - International …, 2022 - journals.sagepub.com
The application of Big Data Analytics is identified through the Cyber Research Alliance for
cybersecurity as the foremost preference for future studies and advancement in the field of …
cybersecurity as the foremost preference for future studies and advancement in the field of …
IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication
In this era of research and technology, Internet of things (IoT) takes a prominent part in the
evolution of applications of the various field like health, education, smart cities, homes …
evolution of applications of the various field like health, education, smart cities, homes …
Internet of Things: Evolution and technologies from a security perspective
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Abstract Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which
allow communication between any vehicle with other adjacent vehicles, road side units and …
allow communication between any vehicle with other adjacent vehicles, road side units and …
A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things
This paper introduces a blockchain-based secure healthcare scheme in which health data
(HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the …
(HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the …
WOA+ BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network
Nowadays, big data plays a substantial part in information knowledge analysis,
manipulation, and forecasting. Analyzing and extracting knowledge from such big datasets …
manipulation, and forecasting. Analyzing and extracting knowledge from such big datasets …
Hiding shares by multimedia image steganography for optimized counting-based secret sharing
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …
multi-user authentication systems. This work focus on improving the counting-based secret …
Hybrid approach for detection of malicious profiles in twitter
SR Sahoo, BB Gupta - Computers & Electrical Engineering, 2019 - Elsevier
Emergence of social media invokes social actors to share their information digitally.
Moreover, it enables them to maintain their links with other people worldwide. Due to its …
Moreover, it enables them to maintain their links with other people worldwide. Due to its …
MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique
Dynamic web applications play a vital role in providing resources manipulation and
interaction between clients and servers. The features presently supported by browsers have …
interaction between clients and servers. The features presently supported by browsers have …