Secure and privacy preserving predictive framework for iot based health cloud system using cryptographic modfels DOI
С. С. Давлатов, Navruzbek Qurbonov,

Aziza Yunusova

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: 3

Published: Dec. 30, 2024

The Internet of Things (IoT) is one the most well-liked developing technologies in IT sector these days. defined as a network physical objects that are intelligent and connected. Through use wired or wireless networks, sensors integrated into physically connected communicate with another. interconnectedness, intelligence, dynamic nature, sensing, large scale, heterogeneity, security its salient characteristics. A consumer can access variety cloud services, including database, application, storage, through network. provides wide range field applications for ongoing monitoring many industries, healthcare. Numerous studies conducted to guarantee patient data privacy. Another challenging component health systems from IoT devices predict disease. Protecting confidential information unauthorised necessary increase security. To improve privacy, classical cryptographic algorithms have been applied. Nevertheless, some issues privacy persist due inadequate As result, this paper suggests an innovative method protect suggested EGEC encryption system be used by users who possess decrypt like addition multiplication carried out.

Language: Английский

Generative AI for Threat Hunting and Behaviour Analysis DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi,

Rehan Akbar

et al.

Advances in digital crime, forensics, and cyber terrorism book series, Journal Year: 2024, Volume and Issue: unknown, P. 235 - 286

Published: Sept. 12, 2024

Cyber threats are becoming more advanced, and so is cybersecurity, which getting intellectual better at hiding its presence. The requirement to achieve the balance between proactive resistive threat-hunting measures in this dynamic environment very high. Part four outlines how new AI techniques enable design of existing processes for hunting potential threats. main objective digress into core principles threat hunting, starting from being including scenarios deducing clues based on hypothesis. Then, authors will highlight limitations conventional methods detecting gimmicks that fool even skilled hunters with an unseen smoking hiddenly a never-ending evolutionary process. Two well-studied approaches tackling these challenges generative models like adversarial networks (GANs) variational autoencoders (VAEs).

Language: Английский

Citations

1

Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems DOI Creative Commons
Jordi Doménech,

Isabel V. Martin-Faus,

Saber Mhiri

et al.

Internet of Things, Journal Year: 2024, Volume and Issue: 28, P. 101420 - 101420

Published: Nov. 5, 2024

Language: Английский

Citations

1

Deep Learning Applications for Healthcare Risk Assessment DOI

Sana Fateh,

Imdad Ali Shah,

Quratulain Sial

et al.

Advances in healthcare information systems and administration book series, Journal Year: 2024, Volume and Issue: unknown, P. 59 - 76

Published: Nov. 22, 2024

The primary object of this chapter is to focus on deep learning and how it useful for healthcare risk assessment. A potential risk, mitigate weaknesses assessment important early detection through the analysis guarantee patient staff safety. approach tackling everyday problems has radically changed in age artificial intelligence (AI), machine learning, learning. We are now concentrating developing technology that specific fields. Deep techniques offer a wide range applications health care, even though still its phases. From keeping an individual's universal record emerging technologies enabled by we will see many upgrades fundamentally change industry scenario coming years. can evaluate organized or unstructured data at high rate.

Language: Английский

Citations

1

Data Security, Privacy and Cyber Policy of Pakistan: A Closer Look DOI

Lubna Luxmi Dhirani

Published: Jan. 8, 2024

Living in an immersive, agile and a fully digital world where the scope, nature ways of communication, connectivity, operations, business, finance, supply-chain, etc. have all changed exposed infrastructures economies to wider cyber threat landscape. Pakistan, being developing nation, holds impressive ranking at global innovation index 2023, however with these advancements there been increased security issues crimes affecting unprivileged population Country. As per United Nations Sustainable Development Goals 10 16, strong emphasis reduce inequalities maintain peace, justice institutions has given. Unresolving problems under privileged may contribute hate crime, bias, inequalities, conflicts prejudice. This paper sheds light on pressing related lack data information controls enabling misuse personal identifiable (i.e., name, health data, geotags, etc.) population. Harvesting is valuable criminals as it allows them impersonate incriminate others for they carried out. reported print media, such cybercrimes rise Pakistan thus this addresses urgency revise national cybersecurity policy norms.

Language: Английский

Citations

0

Revolutionizing Healthcare Operations using Narrowband Internet of Things for Efficient Data Transfer and Device Integration DOI

Sohini Ghosh,

Prasanna Kulkarni,

C.G. Balaji

et al.

Published: Sept. 18, 2024

Language: Английский

Citations

0

PUF-Based Authentication System with Resilience against Multi-Faceted Attacks for Blockchain-based IoT Networks DOI

Anindita Sarkar,

S. Ganguly, Partha Sarathi Sarkar

et al.

Published: July 27, 2024

Language: Английский

Citations

0

The Security Risks of Artificial Intelligence Applications on the Healthcare System DOI Creative Commons
Faisal A. Al‐Suwaidan

Saudi Journal of Health Systems Research, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 3

Published: Nov. 19, 2024

Language: Английский

Citations

0

Secure and privacy preserving predictive framework for iot based health cloud system using cryptographic modfels DOI
С. С. Давлатов, Navruzbek Qurbonov,

Aziza Yunusova

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: 3

Published: Dec. 30, 2024

The Internet of Things (IoT) is one the most well-liked developing technologies in IT sector these days. defined as a network physical objects that are intelligent and connected. Through use wired or wireless networks, sensors integrated into physically connected communicate with another. interconnectedness, intelligence, dynamic nature, sensing, large scale, heterogeneity, security its salient characteristics. A consumer can access variety cloud services, including database, application, storage, through network. provides wide range field applications for ongoing monitoring many industries, healthcare. Numerous studies conducted to guarantee patient data privacy. Another challenging component health systems from IoT devices predict disease. Protecting confidential information unauthorised necessary increase security. To improve privacy, classical cryptographic algorithms have been applied. Nevertheless, some issues privacy persist due inadequate As result, this paper suggests an innovative method protect suggested EGEC encryption system be used by users who possess decrypt like addition multiplication carried out.

Language: Английский

Citations

0