[PDF][PDF] Security, privacy research issues in various computing platforms: A survey and the road ahead.

AK Tyagi, MM Nair, S Niladhuri… - Journal of Information …, 2020 - ak-tyagi.com
Security and Privacy (S&P) preserved systems play an important role in decision support for
Internet-mediated service provision. It is essential (need to be mandatory) to enable …

An overview on the internet of things for health monitoring systems

MU Ahmed, M Björkman, A Čaušević, H Fotouhi… - Internet of Things. IoT …, 2016 - Springer
The aging population and the increasing healthcare cost in hospitals are spurring the advent
of remote health monitoring systems. Advances in physiological sensing devices and the …

Security issues on wireless body area network for remote healthcare monitoring

S Lim, TH Oh, YB Choi… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
A case study of security risk analysis of a wireless body area network for remote health
monitoring as a after measure for deploying security and privacy features is introduced in …

Deep learning for cyber security applications: A comprehensive survey

M Alazab, KP Soman, S Srinivasan, S Venkatraman… - Authorea …, 2023 - techrxiv.org
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …

Security in smart home environment

G Mantas, D Lymberopoulos… - Wireless Technologies for …, 2011 - igi-global.com
This chapter presents the concept of Smart Home, describes the Smart Home networking
technologies and discusses the main issues for ensuring security in a Smart Home …

A study of smart home environment and its security threats

S Ul Rehman, S Manickam - International Journal of Reliability …, 2016 - World Scientific
As the world is moving towards Internet of Things, smart home is now rapidly becoming a
reality. Home appliances and devices are interconnected, ie, home area network, via …

Exact interference of adaptive variable-rate tasks under fixed-priority scheduling

A Biondi, A Melani, M Marinoni… - 2014 26th euromicro …, 2014 - ieeexplore.ieee.org
Engine control applications require the execution of tasks activated in relation to specific
system variables, such as the crankshaft rotation angle. To prevent possible overload …

End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust

AV Dhukaram, C Baber, L Elloumi… - 2011 5th …, 2011 - ieeexplore.ieee.org
This study examined patient and caregiver's perception regarding pervasive healthcare
technology using five focus groups and a 31-item questionnaire. To further develop an …

A biometric key establishment protocol for body area networks

L Yao, B Liu, G Wu, K Yao… - International Journal of …, 2011 - journals.sagepub.com
Current advances in semiconductor technology have made it possible to implant a network
of biosensors inside the human body for health monitoring. In the context of a body area …

Analysis of security attacks in a smart home networks

U Saxena, JS Sodhi, Y Singh - 2017 7th international …, 2017 - ieeexplore.ieee.org
This paper presents an analytical review about smart home network, their working and
technologies from a security standpoint. It highlights various security flaws in a different …