Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Shafik W. (2024). The Future of Healthcare. Artificial Intelligence and Machine Learning in Drug Design and Development. 10.1002/9781394234196.ch19. (605-634). Online publication date: 12-Jul-2024.

    https://onlinelibrary.wiley.com/doi/10.1002/9781394234196.ch19

  • Yan H, Bilal M, Xu X and Vimal S. Edge Server Deployment for Health Monitoring With Reinforcement Learning in Internet of Medical Things. IEEE Transactions on Computational Social Systems. 10.1109/TCSS.2022.3161996. 11:3. (3079-3089).

    https://ieeexplore.ieee.org/document/9756416/

  • Khan I, Razzak I, Pi D, Zia U, Kamal S and Hussain Y. A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features. IEEE Journal of Biomedical and Health Informatics. 10.1109/JBHI.2024.3352013. 28:6. (3228-3235).

    https://ieeexplore.ieee.org/document/10387570/

  • Hameed K, Naha R and Hameed F. (2024). Digital transformation for sustainable health and well-being: a review and future research directions. Discover Sustainability. 10.1007/s43621-024-00273-8. 5:1.

    https://link.springer.com/10.1007/s43621-024-00273-8

  • Dhanasekaran S, Thamaraimanalan T, Vivek Karthick P and Silambarasan D. (2024). A Lightweight CNN with LSTM Malware Detection Architecture for 5G and IoT Networks. IETE Journal of Research. 10.1080/03772063.2024.2352151. (1-12).

    https://www.tandfonline.com/doi/full/10.1080/03772063.2024.2352151

  • Wani R, Thabit F and Can O. (2024). Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review. SECURITY AND PRIVACY. 10.1002/spy2.409.

    https://onlinelibrary.wiley.com/doi/10.1002/spy2.409

  • SaberiKamarposhti M, Ng K, Chua F, Abdullah J, Yadollahi M, Moradi M and Ahmadpour S. (2024). Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon. 10.1016/j.heliyon.2024.e31406. 10:10. (e31406). Online publication date: 1-May-2024.

    https://linkinghub.elsevier.com/retrieve/pii/S2405844024074371

  • Kumar N and Sharma S. (2024). PathGuard: Trustworthy Routing for Sustainable and Secure IoT-WSN Networks. Wireless Personal Communications: An International Journal. 136:1. (469-487). Online publication date: 1-May-2024.

    https://doi.org/10.1007/s11277-024-11289-8

  • Fatima A and Masood S. (2024). Machine learning approaches for neurological disease prediction: A systematic review. Expert Systems. 10.1111/exsy.13569.

    https://onlinelibrary.wiley.com/doi/10.1111/exsy.13569

  • Haque N, Rahman M and Uluagac S. (2024). Formal threat analysis of machine learning-based control systems. Computers and Security. 139:C. Online publication date: 1-Apr-2024.

    https://doi.org/10.1016/j.cose.2024.103709

  • Anitha D, Sasikala S, Velmurugan A, Sharmila V, Banupriya R and Muthusamy P. (2024). Advancements in Early Warning Systems and Human Factors in Lightweight Secured IoMT Ecosystems for Healthcare 4.0. Social Innovations in Education, Environment, and Healthcare. 10.4018/979-8-3693-2569-8.ch016. (318-338).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-2569-8.ch016

  • Messinis S, Temenos N, Protonotarios N, Rallis I, Kalogeras D and Doulamis N. (2024). Enhancing Internet of Medical Things security with artificial intelligence. Computers in Biology and Medicine. 170:C. Online publication date: 1-Mar-2024.

    https://doi.org/10.1016/j.compbiomed.2024.108036

  • Chorney W and Wang H. (2024). Towards federated transfer learning in electrocardiogram signal analysis. Computers in Biology and Medicine. 170:C. Online publication date: 1-Mar-2024.

    https://doi.org/10.1016/j.compbiomed.2024.107984

  • Melhem H, Salloum E, Oudeh A, Anbar M, Molhem M and Golubtsov I. (2024). Strengthening Health Care Networks: A Security Model for Enhanced Cyber Resilience Using Hybrid Honeypots 2024 6th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE). 10.1109/REEPE60449.2024.10479780. 979-8-3503-8289-1. (1-6).

    https://ieeexplore.ieee.org/document/10479780/

  • Alharbi A, Sen A, Bahbouh N and Yamin M. (2024). A Steganography Approach for Hiding Data in Arabic Text based on Diacritics 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom). 10.23919/INDIACom61295.2024.10498336. 978-93-80544-51-9. (106-110).

    https://ieeexplore.ieee.org/document/10498336/

  • Muazu T, Mao Y, Muhammad A, Ibrahim M, Kumshe U and Samuel O. (2024). A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing. Computer Communications. 216:C. (168-182). Online publication date: 15-Feb-2024.

    https://doi.org/10.1016/j.comcom.2024.01.006

  • Tariq M. (2024). Enhancing Cybersecurity Protocols in Modern Healthcare Systems. Transformative Approaches to Patient Literacy and Healthcare Innovation. 10.4018/979-8-3693-3661-8.ch011. (223-241).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3661-8.ch011

  • Alharbi A. (2024). Federated transfer learning for attack detection for Internet of Medical Things. International Journal of Information Security. 23:1. (81-100). Online publication date: 1-Feb-2024.

    https://doi.org/10.1007/s10207-023-00805-9

  • Fan S, Jain R and Kankanhalli M. (2024). A Comprehensive Picture of Factors Affecting User Willingness to Use Mobile Health Applications. ACM Transactions on Computing for Healthcare. 5:1. (1-31). Online publication date: 31-Jan-2024.

    https://doi.org/10.1145/3626962

  • Shah I, Laraib A, Ashraf H and Hussain F. (2024). Drone Technology. Cybersecurity Issues and Challenges in the Drone Industry. 10.4018/979-8-3693-0774-8.ch014. (343-361).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0774-8.ch014

  • Shah I, Jhanjhi N and Ujjan R. (2024). Use of AI Applications for the Drone Industry. Cybersecurity Issues and Challenges in the Drone Industry. 10.4018/979-8-3693-0774-8.ch002. (27-41).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0774-8.ch002

  • Alkailani M, Abdulhassan A and Alnahar S. (2024). Iraqi Population Trusts in Electronic Healthcare Records: A Cross-sectional Study. INQUIRY: The Journal of Health Care Organization, Provision, and Financing. 10.1177/00469580241249448. 61. Online publication date: 1-Jan-2024.

    https://journals.sagepub.com/doi/10.1177/00469580241249448

  • Anitha G, Gurushankar R and Parvathavarthini S. (2024). An ML Approach to Analyze Cyberthreats and Vulnerabilities in the Healthcare Ecosystem. Smart Healthcare and Machine Learning. 10.1007/978-981-97-3312-5_8. (113-128).

    https://link.springer.com/10.1007/978-981-97-3312-5_8

  • Baum S and Manikas K. (2024). Investigating AI in Medical Devices: The Need for Better Establishment of Risk-Assessment and Regulatory Foundations. Pervasive Computing Technologies for Healthcare. 10.1007/978-3-031-59717-6_4. (51-69).

    https://link.springer.com/10.1007/978-3-031-59717-6_4

  • Sánchez P, Nespoli P, Alfaro J and Mármol F. (2024). Methodology for Automating Attacking Agents in Cyber Range Training Platforms. Secure and Resilient Digital Transformation of Healthcare. 10.1007/978-3-031-55829-0_6. (90-109).

    https://link.springer.com/10.1007/978-3-031-55829-0_6

  • Mahanayak S, Nikhita B and Mishra S. (2024). Towards Blockchain Driven Solution for Remote Healthcare Service: An Analytical Study. Blockchain Transformations. 10.1007/978-3-031-49593-9_4. (59-79).

    https://link.springer.com/10.1007/978-3-031-49593-9_4

  • Mahmud S, Keller M, Ahmed S and Karam R. (2024). FAMID: False Alarms Mitigation in IoMT Devices. Internet of Things. Advances in Information and Communication Technology. 10.1007/978-3-031-45878-1_14. (199-217).

    https://link.springer.com/10.1007/978-3-031-45878-1_14

  • López Martínez A, Gil Pérez M and Ruiz-Martínez A. (2023). A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare. ACM Computing Surveys. 55:12. (1-38). Online publication date: 31-Dec-2024.

    https://doi.org/10.1145/3571156

  • Yaqub N, Zhang J and Wang W. (2023). Enhancing Security and Privacy in Healthcare: A Conceptual Model 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00053. 979-8-3503-0946-1. (188-195).

    https://ieeexplore.ieee.org/document/10501890/

  • Offermann J, Maidhof C and Ziefle M. (2023). Somebody is watching me? Analyzing privacy preferences in using visual AAL technology considering human-, technology-, and context-related factors. Universal Access in the Information Society. 10.1007/s10209-023-01070-2.

    https://link.springer.com/10.1007/s10209-023-01070-2

  • Goldschmidt G, Zeiser F, Righi R and Da Costa C. (2023). ARTERIAL: A Natural Language Processing Model for Prevention of Information Leakage from Electronic Health Records 2023 XIII Brazilian Symposium on Computing Systems Engineering (SBESC). 10.1109/SBESC60926.2023.10324212. 979-8-3503-9410-8. (1-6).

    https://ieeexplore.ieee.org/document/10324212/

  • Brkić M, Dinu H, Mirković A, Sabirović A, Khan S and Svetinović D. (2023). Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). 10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361458. 979-8-3503-0460-2. (0784-0791).

    https://ieeexplore.ieee.org/document/10361458/

  • Kwarteng E and Cebe M. (2023). MEDICALHARM - A Threat Modeling designed for Modern Medical Devices 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom60117.2023.00157. 979-8-3503-8199-3. (1147-1156).

    https://ieeexplore.ieee.org/document/10538960/

  • Irshad R, Sohail S, Hussain S, Madsen D, Zamani A, Ahmed A, Alattab A, Badr M and Alwayle I. (2023). Towards enhancing security of IoT-Enabled healthcare system. Heliyon. 10.1016/j.heliyon.2023.e22336. 9:11. (e22336). Online publication date: 1-Nov-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S2405844023095440

  • Khan F, Jan M, Alturki R, Alshehri M, Shah S and Rehman A. A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT. IEEE Transactions on Industrial Informatics. 10.1109/TII.2022.3231424. 19:10. (10125-10132).

    https://ieeexplore.ieee.org/document/10018517/

  • Bhukya C, Thakur P, Mudhivarthi B and Singh G. (2023). Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors. 10.3390/s23198107. 23:19. (8107).

    https://www.mdpi.com/1424-8220/23/19/8107

  • Aijaz M, Nazir M and Mohammad M. (2023). Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation. SN Computer Science. 4:6. Online publication date: 21-Sep-2023.

    https://doi.org/10.1007/s42979-023-02221-1

  • Tanveer M, Khan A, Ahmad M, Nguyen T and El-Latif A. Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Transactions on Network Science and Engineering. 10.1109/TNSE.2022.3203927. 10:5. (2525-2536).

    https://ieeexplore.ieee.org/document/9875976/

  • Upadrista V, Nazir S and Tianfield H. (2023). Secure data sharing with blockchain for remote health monitoring applications: a review. Journal of Reliable Intelligent Environments. 10.1007/s40860-023-00204-w. 9:3. (349-368). Online publication date: 1-Sep-2023.

    https://link.springer.com/10.1007/s40860-023-00204-w

  • Suleski T and Ahmed M. (2023). A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things. Journal of Medical Internet Research. 10.2196/44114. 25. (e44114).

    https://www.jmir.org/2023/1/e44114

  • Rao P and Deebak B. (2022). Security and privacy issues in smart cities/industries: technologies, applications, and challenges. Journal of Ambient Intelligence and Humanized Computing. 10.1007/s12652-022-03707-1. 14:8. (10517-10553). Online publication date: 1-Aug-2023.

    https://link.springer.com/10.1007/s12652-022-03707-1

  • Ballardini G, Tamadon I, Guarnera D, Al-Haddad H, Iacovacci V, Mariottini F, Ricciardi S, Cucini A, Libera A, Vistoli F, Menciassi A, Dario P, Cobelli C and Ricotti L. (2023). Controlling and powering a fully implantable artificial pancreas refillable by ingestible pills 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). 10.1109/EMBC40787.2023.10340006. 979-8-3503-2447-1. (1-7).

    https://ieeexplore.ieee.org/document/10340006/

  • Gehrmann J, Herczog E, Decker S and Beyan O. (2023). What prevents us from reusing medical real-world data in research. Scientific Data. 10.1038/s41597-023-02361-2. 10:1.

    https://www.nature.com/articles/s41597-023-02361-2

  • Czekster R, Grace P, Marcon C, Hessel F and Cazella S. (2023). Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT. Applied Sciences. 10.3390/app13137406. 13:13. (7406).

    https://www.mdpi.com/2076-3417/13/13/7406

  • Albattah A and Rassam M. (2023). Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications. Applied Sciences. 10.3390/app13116807. 13:11. (6807).

    https://www.mdpi.com/2076-3417/13/11/6807

  • Gupta D, Rani S, Raza S, Faseeh Qureshi N, Mansour R and Ragab M. (2023). Security paradigm for remote health monitoring edge devices in internet of things. Journal of King Saud University - Computer and Information Sciences. 35:6. Online publication date: 1-Jun-2023.

    https://doi.org/10.1016/j.jksuci.2022.12.020

  • Si-Ahmed A, Al-Garadi M and Boustia N. (2023). Survey of Machine Learning based intrusion detection methods for Internet of Medical Things. Applied Soft Computing. 140:C. Online publication date: 1-Jun-2023.

    https://doi.org/10.1016/j.asoc.2023.110227

  • Affia A, Finch H, Jung W, Samori I, Potter L and Palmer X. (2023). IoT Health Devices: Exploring Security Risks in the Connected Landscape. IoT. 10.3390/iot4020009. 4:2. (150-182).

    https://www.mdpi.com/2624-831X/4/2/9

  • Riggs H, Tufail S, Parvez I, Tariq M, Khan M, Amir A, Vuda K and Sarwat A. (2023). Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors. 10.3390/s23084060. 23:8. (4060).

    https://www.mdpi.com/1424-8220/23/8/4060

  • Hadi H, Cao Y, Nisa K, Jamil A and Ni Q. (2023). A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. Journal of Network and Computer Applications. 213:C. Online publication date: 1-Apr-2023.

    https://doi.org/10.1016/j.jnca.2023.103607

  • Mekdad Y, Aris A, Babun L, Fergougui A, Conti M, Lazzeretti R and Uluagac A. (2023). A survey on security and privacy issues of UAVs. Computer Networks: The International Journal of Computer and Telecommunications Networking. 224:C. Online publication date: 1-Apr-2023.

    https://doi.org/10.1016/j.comnet.2023.109626

  • Singh P, Gaba G, Kaur A, Hedabou M and Gurtov A. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT. IEEE Journal of Biomedical and Health Informatics. 10.1109/JBHI.2022.3186250. 27:2. (722-731).

    https://ieeexplore.ieee.org/document/9826463/

  • Suleski T, Ahmed M, Yang W and Wang E. (2023). A review of multi-factor authentication in the Internet of Healthcare Things. DIGITAL HEALTH. 10.1177/20552076231177144. 9. (205520762311771). Online publication date: 1-Jan-2023.

    http://journals.sagepub.com/doi/10.1177/20552076231177144

  • Jiang Y, Zhang W and Chen Y. (2023). Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning. IEEE Transactions on Information Forensics and Security. 18. (1625-1637). Online publication date: 1-Jan-2023.

    https://doi.org/10.1109/TIFS.2023.3249568

  • Arbabi M, Lal C, Veeraragavan N, Marijan D, Nygård J and Vitenberg R. (2023). A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions. IEEE Communications Surveys & Tutorials. 25:1. (386-424). Online publication date: 1-Jan-2023.

    https://doi.org/10.1109/COMST.2022.3224644

  • Martínez A, Pérez M and Ruiz-Martínez A. A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario. IEEE Access. 10.1109/ACCESS.2023.3338170. 11. (137083-137098).

    https://ieeexplore.ieee.org/document/10336802/

  • Bernal-Romero J, Ramirez-Cortes J, Rangel-Magdaleno J, Gomez-Gil P, Peregrina-Barreto H and Cruz-Vega I. A Review on Protection and Cancelable Techniques in Biometric Systems. IEEE Access. 10.1109/ACCESS.2023.3239387. 11. (8531-8568).

    https://ieeexplore.ieee.org/document/10024954/

  • Li N, Xu M, Li Q, Liu J, Bao S, Li Y, Li J and Zheng H. (2023). A review of security issues and solutions for precision health in Internet-of-Medical-Things systems. Security and Safety. 10.1051/sands/2022010. 2. (2022010).

    https://sands.edpsciences.org/10.1051/sands/2022010

  • Gull U, Singh Y and Rana B. (2023). Energy-Efficient Priority-Based Routing Model for Smart Health Care. Proceedings of International Conference on Recent Innovations in Computing. 10.1007/978-981-99-0601-7_25. (329-340).

    https://link.springer.com/10.1007/978-981-99-0601-7_25

  • Patel Z, Velankar Y, Trivedi C and Oza P. (2023). Wireless Implantable Medical Devices Security and Privacy: A Survey. Smart Energy and Advancement in Power Technologies. 10.1007/978-981-19-4975-3_6. (69-87).

    https://link.springer.com/10.1007/978-981-19-4975-3_6

  • Raso E, Bianco G, Bracciale L, Marrocco G, Occhiuzzi C and Loreti P. (2022). Privacy-Aware Architectures for NFC and RFID Sensors in Healthcare Applications. Sensors. 10.3390/s22249692. 22:24. (9692).

    https://www.mdpi.com/1424-8220/22/24/9692

  • Garcia R, Ramachandran G, Jurdak R and Ueyama J. Blockchain-Aided and Privacy-Preserving Data Governance in Multi-Stakeholder Applications. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2022.3225254. 19:4. (3781-3793).

    https://ieeexplore.ieee.org/document/9964420/

  • Zhang X and Jaskolka J. (2022). Conceptualizing the Secure Machine Learning Operations (SecMLOps) Paradigm 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS). 10.1109/QRS57517.2022.00023. 978-1-6654-7704-8. (127-138).

    https://ieeexplore.ieee.org/document/10062371/

  • Hadi H and Cao Y. (2022). Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems 2022 International Conference on Frontiers of Information Technology (FIT). 10.1109/FIT57066.2022.00047. 979-8-3503-4593-3. (213-218).

    https://ieeexplore.ieee.org/document/10043088/

  • Sikder A, Babun L, Celik Z, Aksu H, McDaniel P, Kirda E and Uluagac A. (2022). Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Transactions on Internet of Things. 3:4. (1-39). Online publication date: 30-Nov-2022.

    https://doi.org/10.1145/3543513

  • Alam S, Shuaib M, Ahmad S, Jayakody D, Muthanna A, Bharany S and Elgendy I. (2022). Blockchain-Based Solutions Supporting Reliable Healthcare for Fog Computing and Internet of Medical Things (IoMT) Integration. Sustainability. 10.3390/su142215312. 14:22. (15312).

    https://www.mdpi.com/2071-1050/14/22/15312

  • Zubair M, Ghubaish A, Unal D, Al-Ali A, Reimann T, Alinier G, Hammoudeh M and Qadir J. (2022). Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors. 10.3390/s22218280. 22:21. (8280).

    https://www.mdpi.com/1424-8220/22/21/8280

  • Kang G and Kim Y. (2022). Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control. Journal of Medical Internet Research. 10.2196/37978. 24:10. (e37978).

    https://www.jmir.org/2022/10/e37978

  • Garcia R, Ramachandran G and Ueyama J. (2022). Exploiting smart contracts in PBFT-based blockchains. Computer Networks: The International Journal of Computer and Telecommunications Networking. 211:C. Online publication date: 5-Jul-2022.

    https://doi.org/10.1016/j.comnet.2022.109003

  • Tang X, Liu S, Che W and Tang W. (2022). Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor 2022 IEEE International Symposium on Circuits and Systems (ISCAS). 10.1109/ISCAS48785.2022.9937707. 978-1-6654-8485-5. (1150-1154).

    https://ieeexplore.ieee.org/document/9937707/

  • Talati R and Chaudhari P. (2022). The Road-ahead for E-healthcare 4.0: A Review of Security Challenges 2022 1st International Conference on Informatics (ICI). 10.1109/ICI53355.2022.9786917. 978-1-6654-3722-6. (208-213).

    https://ieeexplore.ieee.org/document/9786917/

  • Marulli F, Marrone S and Verde L. (2022). Sensitivity of Machine Learning Approaches to Fake and Untrusted Data in Healthcare Domain. Journal of Sensor and Actuator Networks. 10.3390/jsan11020021. 11:2. (21).

    https://www.mdpi.com/2224-2708/11/2/21

  • Taheri S and Asadizanjani N. (2022). An Overview of Medical Electronic Hardware Security and Emerging Solutions. Electronics. 10.3390/electronics11040610. 11:4. (610).

    https://www.mdpi.com/2079-9292/11/4/610

  • Smys S and S. Raj J. (2022). Future Challenges of the Internet of Things in the Health Care Domain - An Overview. Journal of Trends in Computer Science and Smart Technology. 10.36548/jtcsst.2021.4.003. 3:4. (274-286).

    https://irojournals.com/tcsst/article/pdf/3/4/3

  • Oz H, Aris A, Levi A and Uluagac A. (2022). A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Computing Surveys. 54:11s. (1-37). Online publication date: 31-Jan-2022.

    https://doi.org/10.1145/3514229

  • Selamat A, Hameed S, Abdul Latiff L, A. Razak S, Krejcar O and Penhaker M. (2022). A Fog-Based Threat Detection for Telemetry Smart Medical Devices Using a Real-Time and Lightweight Incremental Learning Method. Handbook of Research on New Investigations in Artificial Life, AI, and Machine Learning. 10.4018/978-1-7998-8686-0.ch007. (141-159).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8686-0.ch007

  • Barbaria S, Mont M, Ghadafi E, Mahjoubi Machraoui H and Rahmouni H. Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access. 10.1109/ACCESS.2022.3206046. 10. (106334-106351).

    https://ieeexplore.ieee.org/document/9887938/

  • Kandasamy K, Srinivas S, Achuthan K and Rangan V. Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access. 10.1109/ACCESS.2022.3145372. 10. (12345-12364).

    https://ieeexplore.ieee.org/document/9690161/

  • Unal D, Bennbaia S and Catak F. (2022). Machine learning for the security of healthcare systems based on Internet of Things and edge computing. Cybersecurity and Cognitive Science. 10.1016/B978-0-323-90570-1.00007-3. (299-320).

    https://linkinghub.elsevier.com/retrieve/pii/B9780323905701000073

  • Aijaz M, Nazir M and Anwar M. (2022). Generating Attack–Defense Tree by Automatically Retrieving Domain-Specific Security Attack Patterns. Artificial Intelligence and Sustainable Computing. 10.1007/978-981-19-1653-3_11. (131-145).

    https://link.springer.com/10.1007/978-981-19-1653-3_11

  • Kumar P, Singh A and Sengupta A. (2022). Securing Cyber-Resilience in Healthcare Sector. Cyber Security in Intelligent Computing and Communications. 10.1007/978-981-16-8012-0_17. (211-226).

    https://link.springer.com/10.1007/978-981-16-8012-0_17

  • Selvakkumar A, Pal S and Jadidi Z. (2022). Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives. Sensing Technology. 10.1007/978-3-030-98886-9_21. (269-282).

    https://link.springer.com/10.1007/978-3-030-98886-9_21

  • Ahmed M and Zubair S. (2022). Explainable Artificial Intelligence in Sustainable Smart Healthcare. Explainable Artificial Intelligence for Cyber Security. 10.1007/978-3-030-96630-0_12. (265-280).

    https://link.springer.com/10.1007/978-3-030-96630-0_12

  • Hameed S, Selamat A, Abdul Latiff L, Razak S, Krejcar O, Fujita H, Ahmad Sharif M and Omatu S. (2021). A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog. Sensors. 10.3390/s21248289. 21:24. (8289).

    https://www.mdpi.com/1424-8220/21/24/8289

  • Alodaynan A and Alanazi A. (2021). A survey of cybersecurity vulnerabilities in healthcare systems. International Journal of ADVANCED AND APPLIED SCIENCES. 10.21833/ijaas.2021.12.007. 8:12. (48-55). Online publication date: 1-Dec-2021.

    http://www.science-gate.com/IJAAS/2021/V8I12/1021833ijaas202112007.html

  • Khan M and Alkaabi N. (2021). Rebirth of Distributed AI—A Review of eHealth Research. Sensors. 10.3390/s21154999. 21:15. (4999).

    https://www.mdpi.com/1424-8220/21/15/4999

  • Silva J, Macedo E, Correa Y and Medeiros R. (2021). A Multilayer Proposal to a Smart Home Applied to Healthcare. Polytechnica. 10.1007/s41050-021-00029-7. 4:1. (1-14). Online publication date: 1-Apr-2021.

    https://link.springer.com/10.1007/s41050-021-00029-7

  • Franco J, Aris A, Canberk B and Uluagac A. A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2021.3106669. 23:4. (2351-2383).

    https://ieeexplore.ieee.org/document/9520645/

  • Shahriar M, Rahman M, Haque N, Chowdhury B and Whisenant S. (2021). iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems. Security and Privacy in Communication Networks. 10.1007/978-3-030-90022-9_17. (338-359).

    https://link.springer.com/10.1007/978-3-030-90022-9_17

  • Hameed S, Hassan W and Latiff L. (2021). An Efficient Fog-Based Attack Detection Using Ensemble of MOA-WMA for Internet of Medical Things. Innovative Systems for Intelligent Health Informatics. 10.1007/978-3-030-70713-2_70. (774-785).

    https://link.springer.com/10.1007/978-3-030-70713-2_70

  • Becher S, Gerl A, Meier B and Bölz F. (2020). Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow. Information. 10.3390/info11070356. 11:7. (356).

    https://www.mdpi.com/2078-2489/11/7/356