A novel framework on security and energy enhancement based on internet of medical things for healthcare 5.0

R Natarajan, GH Lokesh, F Flammini, A Premkumar… - Infrastructures, 2023 - mdpi.com
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method
of connecting medical equipment and the software that operates on it to the computer …

Security and privacy aspects of electronic health records: A review

D Sharma, C Prabha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the growth in population, there is an increase in the amount of Electronic Health
Records (EHR) and so is the rise in concern regarding their security and privacy. At present …

[PDF][PDF] A review on cloud data security challenges and existing countermeasures in cloud computing

P Singh, AK Pandey - International Journal of Data Informatics and …, 2022 - researchgate.net
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …

[HTML][HTML] Adopting security practices in software development process: Security testing framework for sustainable smart cities

Y Mothanna, W ElMedany, M Hammad, R Ksantini… - Computers & …, 2024 - Elsevier
The dependence on smart city applications has expanded in recent years. Consequently,
the number of cyberattack attempts to exploit smart application vulnerabilities significantly …

Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System

A Alharbi - Sensors, 2023 - mdpi.com
Cybersecurity information sharing (CIS) is important in different business processes to
secure data transmission, because it comprises Internet of Things (IoT) connectivity …

[HTML][HTML] Utilizing a machine learning algorithm to choose a significant traffic identification system

R Natarajan, CP Ranjith, MSK Mohideen… - International Journal of …, 2024 - Elsevier
The tremendous advancements in computing, sensing, and cognitive-based revolution have
made way for critical infrastructure needed to improve the internet for more extensive …

Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures

M Boopathi, S Gupta, ANM Zabeeulla, R Gupta… - Soft computing, 2023 - Springer
Edge computing is an innovative solution to cloud computing's IoT application support
issues. Due to network instability and increased attack surfaces, edge-assisted IoT security …

Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach

A Jabbari, TA Teli, F Masoodi, FA Reegu… - Frontiers in …, 2024 - frontiersin.org
The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles,
such as scarce water resources, the elevated salinity and alkalinity of irrigation water …

Advancing cyber resilience for autonomous systems with novel ai-based intrusion prevention model

S Krishna - International Journal of Data Informatics and Intelligent …, 2024 - ijdiic.com
Autonomous systems rely on intricate algorithms and are networked, which makes them
more susceptible to cyber-attacks. The contexts of traditional intrusion prevention systems …

Preservation of sensitive data using multi-level Blockchain-based secured framework for edge network devices

C Awasthi, PK Mishra, PK Pal, SB Khan… - Journal of Grid …, 2023 - Springer
The proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB)
of information are being produced in the IoT environs because of the ever-increasing …