Deleted Journal,
Journal Year:
2024,
Volume and Issue:
3
Published: Dec. 30, 2024
The
Internet
of
Things
(IoT)
is
one
the
most
well-liked
developing
technologies
in
IT
sector
these
days.
defined
as
a
network
physical
objects
that
are
intelligent
and
connected.
Through
use
wired
or
wireless
networks,
sensors
integrated
into
physically
connected
communicate
with
another.
interconnectedness,
intelligence,
dynamic
nature,
sensing,
large
scale,
heterogeneity,
security
its
salient
characteristics.
A
consumer
can
access
variety
cloud
services,
including
database,
application,
storage,
through
network.
provides
wide
range
field
applications
for
ongoing
monitoring
many
industries,
healthcare.
Numerous
studies
conducted
to
guarantee
patient
data
privacy.
Another
challenging
component
health
systems
from
IoT
devices
predict
disease.
Protecting
confidential
information
unauthorised
necessary
increase
security.
To
improve
privacy,
classical
cryptographic
algorithms
have
been
applied.
Nevertheless,
some
issues
privacy
persist
due
inadequate
As
result,
this
paper
suggests
an
innovative
method
protect
suggested
EGEC
encryption
system
be
used
by
users
who
possess
decrypt
like
addition
multiplication
carried
out.
Computer Science & IT Research Journal,
Journal Year:
2024,
Volume and Issue:
5(3), P. 703 - 724
Published: March 22, 2024
In
the
ever-evolving
landscape
of
cybersecurity,
proliferation
artificial
intelligence
(AI)
technologies
introduces
both
promising
advancements
and
daunting
challenges.
This
paper
explores
theoretical
underpinnings
practical
implications
addressing
cybersecurity
challenges
in
age
AI.
With
integration
AI
into
various
facets
digital
infrastructure,
including
threat
detection,
authentication,
response
mechanisms,
cyber
threats
have
become
increasingly
sophisticated
difficult
to
mitigate.
Theoretical
approaches
delve
understanding
intricate
interplay
between
algorithms,
human
behavior,
adversarial
tactics,
elucidating
underlying
mechanisms
attacks
defense
strategies.
However,
this
complexity
also
engenders
novel
vulnerabilities,
as
AI-driven
leverage
machine
learning
algorithms
evade
traditional
security
measures,
posing
formidable
organizations
across
sectors.
As
such,
solutions
necessitate
a
multifaceted
approach,
encompassing
robust
intelligence,
adaptive
ethical
considerations
safeguard
against
effectively.
Leveraging
for
holds
promise
enhancing
detection
capabilities,
automating
actions,
augmenting
analysts'
capabilities.
Yet,
inherent
limitations,
such
algorithmic
biases,
data
privacy
concerns,
potential
AI-enabled
attacks,
underscore
need
comprehensive
risk
management
framework.
Regulatory
frameworks
industry
standards
play
crucial
role
shaping
development
deployment
AI-powered
solutions,
ensuring
accountability,
transparency,
compliance
with
principles.
Moreover,
fostering
interdisciplinary
collaboration
investing
education
training
are
vital
cultivating
skilled
workforce
equipped
navigate
evolving
landscape.
By
integrating
insights
strategies,
elucidates
key
opportunities
securing
systems,
offering
policymakers,
researchers,
practitioners
alike.
Keywords:
Cybersecurity;
Artificial
Intelligence;
Threat
Detection;
Defense
Strategies;
Ethical
Considerations;
Frameworks.
Deleted Journal,
Journal Year:
2024,
Volume and Issue:
4(2), P. 20 - 62
Published: May 23, 2024
Cutting-edge
technologies
have
been
widely
employed
in
healthcare
delivery,
resulting
transformative
advances
and
promising
enhanced
patient
care,
operational
efficiency,
resource
usage.
However,
the
proliferation
of
networked
devices
data-driven
systems
has
created
new
cybersecurity
threats
that
jeopardize
integrity,
confidentiality,
availability
critical
data.
This
review
paper
offers
a
comprehensive
evaluation
current
state
context
smart
healthcare,
presenting
structured
taxonomy
its
existing
cyber
threats,
mechanisms
essential
roles.
study
explored
(SHSs).
It
identified
discussed
most
pressing
attacks
SHSs
face,
including
fake
base
stations,
medjacking,
Sybil
attacks.
examined
security
measures
deployed
to
combat
SHSs.
These
include
cryptographic-based
techniques,
digital
watermarking,
steganography,
many
others.
Patient
data
protection,
prevention
breaches,
maintenance
SHS
integrity
are
some
roles
ensuring
sustainable
healthcare.
The
long-term
viability
depends
on
constant
assessment
risks
harm
providers,
patients,
professionals.
aims
inform
policymakers,
practitioners,
technology
stakeholders
about
imperatives
best
practices
for
fostering
secure
resilient
ecosystem
by
synthesizing
insights
from
multidisciplinary
perspectives,
such
as
cybersecurity,
management,
sustainability
research.
Understanding
recent
is
controlling
escalating
networks
encouraging
intelligent
delivery.
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: July 18, 2024
Abstract
The
Internet
of
Things
(IoT)
is
an
extensive
system
interrelated
devices
equipped
with
sensors
to
monitor
and
track
real
world
objects,
spanning
several
verticals,
covering
many
different
industries.
IoT's
promise
capturing
interest
as
its
value
in
healthcare
continues
grow,
it
can
overlay
on
top
challenges
dealing
the
rising
burden
chronic
disease
management
aging
population.
To
address
difficulties
associated
IoT-enabled
healthcare,
we
propose
a
secure
routing
protocol
that
combines
fuzzy
logic
Whale
Optimization
Algorithm
(WOA)
hierarchically.
suggested
method
consists
two
primary
approaches:
trust
strategy
WOA-inspired
clustering
methodology.
first
methodology
plays
critical
role
determining
trustworthiness
connected
IoT
equipment.
Furthermore,
WOA-based
framework
implemented.
A
fitness
function
assesses
likelihood
acting
cluster
heads.
This
formula
considers
factors
such
centrality,
range
communication,
hop
count,
remaining
energy,
trustworthiness.
Compared
other
algorithms,
proposed
outperformed
them
terms
network
lifespan,
energy
usage,
packet
delivery
ratio
by
47%,
58%,
17.7%,
respectively.
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 293 - 314
Published: Feb. 28, 2025
This
digital
transformation
brings
forth
significant
challenges
related
to
cyber-security,
particularly
in
safeguarding
the
security
and
privacy
of
patient
data
information.
Artificial
intelligence
has
great
promise
healthcare
industry
because
its
capacity
mimic
human
cognitive
processes
carry
out
activities
that
traditionally
needed
intellect.
There
are
various
artificial
(AI)
techniques,
such
as
computer
vision,
natural
language
processing
machine
learning
algorithms
which
enable
systems
immediately
produce
actionable
insights,
analyze
large
datasets
reveal
complex
patterns.
With
employing
these
capabilities,
practitioners
may
improve
clinical
judgment,
optimize
treatment
strategies
effectively
manage
resources,
all
lead
better
outcomes
a
more
efficient
system.
chapter
focuses
on
intersection
AI,
E-Health,
examining
current
legal
landscape
proposing
futuristic
approach
for
securing
smart
systems.
Mehran University Research Journal of Engineering and Technology,
Journal Year:
2024,
Volume and Issue:
43(2), P. 220 - 220
Published: April 7, 2024
The
data-driven
digital
economy
highly
relies
on
immersive
and
emerging
technologies,
mass
customisation,
autonomous
systems,
seamless
connectivity.
Enabling
such
an
Industrial
IoT/Industry
5.0
environment
requires
streamlined
end-to-end
transparent
methods
for
insights,
visibility,
control.
However,
it
is
important
to
note
that
its
success
depends
data
security
metrics.
recent
cyber-attacks
in
healthcare
industrial
infrastructures
have
led
service
providers
high-risk
scenarios.
From
supply
chain
delivery,
remote
functionality
variables,
enabling
a
fully
connected
factory
major
cybersecurity
concern
as
technologies
employ
different
requirements.
To
mitigate
these
risks,
strategic,
operational,
technical,
alignment
must,
where
the
gaps
between
production
process
environments
must
be
bridged
achieve
prime
goal
of
sustainable,
secure,
technologically
innovative
factory.
This
research
provides
systematic
approach
bridging
Industry
5.0’s
QoS
metrics
by
implementing
Six
Sigma
(6σ)
manufacturing
environment.
further
maps
IT/OT,
cloud,
standards,
thereby
A
use-case
demonstrated
show
how
6σ
implementation
can
improve
metrics,
unifying
standards
resilient,
high-performance