Enhancing Security in Distributed Computing Through Quantum Neural Network-Enabled Blockchain DOI

Qiu Xiuliang,

Anand Singh Rajawat, S. B. Goyal

et al.

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 438 - 449

Published: Jan. 1, 2024

Language: Английский

Navigating the Convergence of IoMT and Generative AI in Global Healthcare DOI
Muhammad Usman Tariq

Advances in healthcare information systems and administration book series, Journal Year: 2025, Volume and Issue: unknown, P. 513 - 534

Published: Jan. 17, 2025

This chapter examines the transformative potential of combining Generative AI with Internet Medical Things (IoMT) in healthcare. IoMT's capacity to empower ceaseless wellbeing observing and ongoing information assortment, joined man-made intelligence's high-level prescient logical power, guarantees huge progressions diagnostics, patient administration, customized medication. The focuses on case studies that demonstrate improved healthcare delivery outcomes as it novel applications these technologies. Be may, additionally addresses basic difficulties like security, moral situations, including insurance, algorithmic predisposition, independence. Systems for beating hindrances, particularly asset compelled settings, are talked about, accentuating requirement hearty structures administrative approaches.

Language: Английский

Citations

5

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0 DOI Creative Commons
Aditya Sharma, Mritunjay Shall Peelam,

Brijesh Kumar Chauasia

et al.

IET Blockchain, Journal Year: 2023, Volume and Issue: 4(3), P. 252 - 262

Published: Nov. 17, 2023

Abstract The modern world has its foundation built on data. Data is generated all the time, and many aspects of society economy are upon it. In today's world, data employed in better decision‐making, innovation, improving efficiency systems. It becomes essential to protect it from being tampered with or misused. Encryptions based cryptographic systems used mainstream protection these days. There have been newer iterations mechanisms new techniques using blockchain zero trust model even that employ fog computing along content delivery networks. advent computation through quantum technologies also helped developing security post‐quantum mechanisms. critical conditions for working hinder their adoption primarily. This leads current lack one more technologies. Thus, importance a unified system can effectively prominent requires definitive investigation. this article, Quantum‐IoT‐based scheme be value Industry 4.0 analyzed. Light shed innovations help solve not just problems but future.

Language: Английский

Citations

17

Quantum Machine Learning for Advanced Threat Detection in Cybersecurity DOI Creative Commons
Reyadh Alluhaibi

International Journal of Safety and Security Engineering, Journal Year: 2024, Volume and Issue: 14(3), P. 875 - 883

Published: June 24, 2024

This study investigates the synergy between Classical Machine Learning (CML) and Quantum (QML) in analyzing security datasets, conducting a comparative analysis using models based on QML CML to evaluate their performance as data sizes iteration counts increase.The author, specifically, employs popular machine learning methods, including Support Vector Machines (SVM), Neural Networks (NN), Logistic Regression (LR), assess these techniques real-world such network intrusion detection malware classification logs.The primary focus is determining effectiveness efficiency of approaches handling large-scale data.Through rigorous experimentation, highlights benefits drawbacks both CML, indicating that while offers significant speedups processing times for large datasets due quantum parallelism, it faces challenges terms hardware accessibility noise sensitivity, though slower with massive data, benefit from mature algorithms more robust infrastructure.The outcomes provide critical insights into practicality applying security-related applications, demonstrating can outperform specific scenarios, real-time threat detection, superior computational efficiency.However, current limitations suggest remains practical many applications short term.This work significantly advances state art Learning.It vital guidance practitioners researchers analysis, underscoring potential revolutionize acknowledging ongoing need advancements computing technology.

Language: Английский

Citations

6

A Deep Auto-Optimized Collaborative Learning (DACL) model for disease prognosis using AI-IoMT systems DOI Creative Commons

Malarvizhi Nandagopal,

Koteeswaran Seerangan,

Tamilmani Govindaraju

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: May 4, 2024

Abstract In modern healthcare, integrating Artificial Intelligence (AI) and Internet of Medical Things (IoMT) is highly beneficial has made it possible to effectively control disease using networks interconnected sensors worn by individuals. The purpose this work develop an AI-IoMT framework for identifying several chronic diseases form the patients’ medical record. For that, Deep Auto-Optimized Collaborative Learning (DACL) Model, a brand-new framework, been developed rapid diagnosis like heart disease, diabetes, stroke. Then, Auto-Encoder Model (DAEM) used in proposed formulate imputed preprocessed data determining fields characteristics or information that are lacking. To speed up classification training testing, Golden Flower Search (GFS) approach then utilized choose best features from data. addition, cutting-edge Bias Integrated GAN (ColBGaN) model created precisely recognizing classifying types records patients. loss function optimally estimated during Water Drop Optimization (WDO) technique, reducing classifier’s error rate. Using some well-known benchmarking datasets performance measures, DACL’s effectiveness efficiency evaluated compared.

Language: Английский

Citations

5

Advancing cybersecurity and privacy with artificial intelligence: current trends and future research directions DOI Creative Commons
Krishnashree Achuthan,

Sasangan Ramanathan,

Sethuraman Srinivas

et al.

Frontiers in Big Data, Journal Year: 2024, Volume and Issue: 7

Published: Dec. 5, 2024

The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised the effectiveness by offering advanced capabilities for intrusion detection, malware classification, preservation. However, this work addresses significant lack comprehensive synthesis AI's use in across vast literature, aiming identify existing gaps guide further progress.

Language: Английский

Citations

5

Internet of things challenges for medical solutions DOI
José Luis Ordóñez-Ávila, Manuel Cardona

Elsevier eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 185 - 194

Published: Jan. 1, 2025

Language: Английский

Citations

0

Quantum communication based cyber security analysis using artificial intelligence with IoMT DOI

Huimin Han,

Jun Yao,

Yujun Wu

et al.

Optical and Quantum Electronics, Journal Year: 2024, Volume and Issue: 56(4)

Published: Jan. 30, 2024

Language: Английский

Citations

3

Artificial intelligence for system security assurance: A systematic literature review DOI Creative Commons
Shao-Fang Wen, Ankur Shukla, Basel Katt

et al.

International Journal of Information Security, Journal Year: 2024, Volume and Issue: 24(1)

Published: Dec. 14, 2024

Abstract System Security Assurance (SSA) has emerged as a critical methodology for organizations to verify the trustworthiness of their systems by evaluating security measures against industry standards, legal requirements, and best practices identify any weakness demonstrate compliance. In recent years, role Artificial Intelligence (AI) in enhancing cybersecurity received increased attention, with an increasing number literature reviews highlighting its diverse applications. However, there remains significant gap comprehensive that specifically address integration AI within SSA frameworks. This systematic review seeks fill this research assessing current state SSA, identifying key areas where contributes improve processes, limitations methodologies, providing guidance future advancements field AI-driven SSA.

Language: Английский

Citations

3

Toward the Internet of Medical Things: Architecture, trends and challenges DOI Creative Commons

Qinwang Niu,

Haoyue Li, Yu Liu

et al.

Mathematical Biosciences & Engineering, Journal Year: 2023, Volume and Issue: 21(1), P. 650 - 678

Published: Jan. 1, 2023

<abstract><p>In recent years, the growing pervasiveness of wearable technology has created new opportunities for medical and emergency rescue operations to protect users' health safety, such as cost-effective solutions, more convenient healthcare quick hospital treatments, which make it easier Internet Medical Things (IoMT) evolve. The study first presents an overview IoMT before introducing architecture. Later, portrays core technologies IoMT, including cloud computing, big data artificial intelligence, elucidates their utilization within system. Further, several emerging challenges, cost-effectiveness, security, privacy, accuracy power consumption, are discussed, potential solutions these challenges also suggested.</p></abstract>

Language: Английский

Citations

7

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives DOI Creative Commons

Chidambar Rao Bhukya,

Prabhat Thakur,

Bhavesh Raju Mudhivarthi

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(19), P. 8107 - 8107

Published: Sept. 27, 2023

The “Internet-of-Medical-Vehicles (IOMV)” is one of the special applications Internet Things resulting from combining connected healthcare and vehicles. As IOMV communicates with a variety networks along its travel path, it incurs various security risks due to sophisticated cyber-attacks. This can endanger onboard patient’s life. So, critical understand subjects related “cybersecurity” in develop robust cybersecurity measures. In this paper, goal evaluate recent trends state-of-the-art publications, gaps, future outlooks research area. With aim, publications between 2016 2023 “Web-of-Science” “Scopus” databases were analysed. Our analysis revealed that niche unexplored area few defined standards frameworks, there great need implement paper will help researchers gain comprehensive idea topic, as presents an top journals highly cited papers, their challenges limitations, system model architecture IOMV, applicable standards, potential cyber-attacks, factors causing risks, artificial intelligence techniques for developing countermeasures, assessment parameterisation constraints challenges, implementing measures IOMV.

Language: Английский

Citations

6