Security and privacy in cloud-based e-health system

R Sivan, ZA Zukarnain - Symmetry, 2021 - mdpi.com
Cloud based healthcare computing have changed the face of healthcare in many ways. The
main advantages of cloud computing in healthcare are scalability of the required service and …

Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …

Analyzing the adoption challenges of the Internet of things (Iot) and artificial intelligence (ai) for smart cities in china

K Wang, Y Zhao, RK Gangadhari, Z Li - Sustainability, 2021 - mdpi.com
Smart cities play a vital role in the growth of a nation. In recent years, several countries have
made huge investments in develo** smart cities to offer sustainable living. However, there …

Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems

N Mtukushe, AK Onaolapo, A Aluko, DG Dorrell - Energies, 2023 - mdpi.com
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …

A triggering mechanism for cyber-attacks in naval sensors and systems

WC Leite Junior, CC de Moraes, CEP de Albuquerque… - Sensors, 2021 - mdpi.com
In the maritime sector, the integration of radar systems, Automatic Identification System (AIS)
and Electronic Chart Display and Information System (ECDIS) through digital technologies …

Detection and isolation of dos and integrity cyber attacks in cyber-physical systems with a neural network-based architecture

CM Paredes, D Martínez-Castro, V Ibarra-Junquera… - Electronics, 2021 - mdpi.com
New applications of industrial automation request great flexibility in the systems, supported
by the increase in the interconnection between its components, allowing access to all the …

[HTML][HTML] Medical data security of wearable tele-rehabilitation under internet of things

K Wang, S **e, J Rodrigues - Internet of Things and Cyber-Physical …, 2022 - Elsevier
Abstract The Internet of Things (IoT)-based intelligent medical system contains confidential
and sensitive information of patients. Most of the data is related to the patient's medical …

A distributed multi-hop intra-clustering approach based on neighbors two-hop connectivity for iot networks

MS Batta, H Mabed, Z Aliouat, S Harous - Sensors, 2021 - mdpi.com
Under a dense and large IoT network, a star topology where each device is directly
connected to the Internet gateway may cause serious waste of energy and congestion …

A deep learning-based classification scheme for false data injection attack detection in power system

Y Ding, K Ma, T Pu, X Wang, R Li, D Zhang - Electronics, 2021 - mdpi.com
A smart grid improves power grid efficiency by using modern information and
communication technologies. However, at the same time, due to the dependence on …

Call graph and model checking for fine-grained android malicious behaviour detection

G Iadarola, F Martinelli, F Mercaldo, A Santone - Applied Sciences, 2020 - mdpi.com
The increasing diffusion of mobile devices, widely used for critical tasks such as the
transmission of sensitive and private information, corresponds to an increasing need for …