[HTML][HTML] IoT: Communication protocols and security threats
In this study, we review the fundamentals of IoT architecture and we thoroughly present the
communication protocols that have been invented especially for IoT technology. Moreover …
communication protocols that have been invented especially for IoT technology. Moreover …
A comprehensive review of the state-of-the-art on security and privacy issues in healthcare
Currently, healthcare is critical environment in our society, which attracts attention to
malicious activities and has caused an important number of damaging attacks. In parallel …
malicious activities and has caused an important number of damaging attacks. In parallel …
Security in IoMT communications: A survey
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …
order to support real-time, remote patient monitoring and treatment. However, the …
A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects
Extensive research has been conducted on healthcare technology and service
advancements during the last decade. The Internet of Medical Things (IoMT) has …
advancements during the last decade. The Internet of Medical Things (IoMT) has …
Understanding dark patterns in home IoT devices
Internet-of-Things (IoT) devices are ubiquitous, but little attention has been paid to how they
may incorporate dark patterns despite consumer protections and privacy concerns arising …
may incorporate dark patterns despite consumer protections and privacy concerns arising …
eHealth: A survey of architectures, developments in mHealth, security concerns and solutions
The ramifications of the COVID-19 pandemic have contributed in part to a recent upsurge in
the study and development of eHealth systems. Although it is almost impossible to cover all …
the study and development of eHealth systems. Although it is almost impossible to cover all …
Securing Bluetooth Low Energy networking: An overview of security procedures and threats
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …
range wireless communications among resource-constrained wireless devices. Securing …
[HTML][HTML] Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
Secure Bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system
Smart health presents an ever-expanding attack surface due to the continuous adoption of a
broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a …
broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a …
IoT health devices: exploring security risks in the connected landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …