Security and privacy in cloud-based e-health system
R Sivan, ZA Zukarnain - Symmetry, 2021 - mdpi.com
Cloud based healthcare computing have changed the face of healthcare in many ways. The
main advantages of cloud computing in healthcare are scalability of the required service and …
main advantages of cloud computing in healthcare are scalability of the required service and …
Survey on wireless network security
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
Analyzing the adoption challenges of the Internet of things (Iot) and artificial intelligence (ai) for smart cities in china
K Wang, Y Zhao, RK Gangadhari, Z Li - Sustainability, 2021 - mdpi.com
Smart cities play a vital role in the growth of a nation. In recent years, several countries have
made huge investments in develo** smart cities to offer sustainable living. However, there …
made huge investments in develo** smart cities to offer sustainable living. However, there …
Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …
A triggering mechanism for cyber-attacks in naval sensors and systems
WC Leite Junior, CC de Moraes, CEP de Albuquerque… - Sensors, 2021 - mdpi.com
In the maritime sector, the integration of radar systems, Automatic Identification System (AIS)
and Electronic Chart Display and Information System (ECDIS) through digital technologies …
and Electronic Chart Display and Information System (ECDIS) through digital technologies …
Detection and isolation of dos and integrity cyber attacks in cyber-physical systems with a neural network-based architecture
CM Paredes, D Martínez-Castro, V Ibarra-Junquera… - Electronics, 2021 - mdpi.com
New applications of industrial automation request great flexibility in the systems, supported
by the increase in the interconnection between its components, allowing access to all the …
by the increase in the interconnection between its components, allowing access to all the …
[HTML][HTML] Medical data security of wearable tele-rehabilitation under internet of things
K Wang, S **e, J Rodrigues - Internet of Things and Cyber-Physical …, 2022 - Elsevier
Abstract The Internet of Things (IoT)-based intelligent medical system contains confidential
and sensitive information of patients. Most of the data is related to the patient's medical …
and sensitive information of patients. Most of the data is related to the patient's medical …
A distributed multi-hop intra-clustering approach based on neighbors two-hop connectivity for iot networks
Under a dense and large IoT network, a star topology where each device is directly
connected to the Internet gateway may cause serious waste of energy and congestion …
connected to the Internet gateway may cause serious waste of energy and congestion …
A deep learning-based classification scheme for false data injection attack detection in power system
A smart grid improves power grid efficiency by using modern information and
communication technologies. However, at the same time, due to the dependence on …
communication technologies. However, at the same time, due to the dependence on …
Call graph and model checking for fine-grained android malicious behaviour detection
The increasing diffusion of mobile devices, widely used for critical tasks such as the
transmission of sensitive and private information, corresponds to an increasing need for …
transmission of sensitive and private information, corresponds to an increasing need for …