ISA evaluation framework for security of internet of health things system using AHP-TOPSIS methods
… In this regard different security models, surveys, frameworks have … Security Attributes (ISA)
framework is presented to evaluate the security features of IoHT based device in healthcare …
framework is presented to evaluate the security features of IoHT based device in healthcare …
… MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for internet of health things
L Ning, Y Ali, H Ke, S Nazir, Z Huanli - IEEE Access, 2020 - ieeexplore.ieee.org
… In this regard, we present an evaluation framework focuses upon the selection of best light
… The proposed framework considers the requirements like performance, physical and security …
… The proposed framework considers the requirements like performance, physical and security …
Development of a hybrid AHP-TOPSIS decision-making framework for technology selection in hospital medication dispensing processes
G Boonsothonsatit, S Vongbunyong… - IEEE …, 2024 - ieeexplore.ieee.org
… making model for supplier evaluation in public healthcare system: The case study … ‘‘ISA
evaluation framework for security of Internet of Health Things system using AHPTOPSIS methods,’…
evaluation framework for security of Internet of Health Things system using AHPTOPSIS methods,’…
Development path of construction industry internet platform: An AHP–TOPSIS integrated approach
… Section 3 describes the methodology and framework applied … , Internet of Things (IoT), and
data mining (DM) techniques for … Internet platform are first identified through a literature review…
data mining (DM) techniques for … Internet platform are first identified through a literature review…
A review on TOPSIS method and its extensions for different applications with recent development
… The research methodology used in the current study is explained using a flowchart with
related details in Sect. 3. Section 4 provides an area-wise application of the TOPSIS …
related details in Sect. 3. Section 4 provides an area-wise application of the TOPSIS …
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
W Alhakami - Plos one, 2024 - journals.plos.org
… new innovations, especially the Internet of Things (IoT), and … Identified Security Attributes
(ISA) framework for IoHT device … the meticulously crafted evaluation framework, combining the …
(ISA) framework for IoHT device … the meticulously crafted evaluation framework, combining the …
Multicriteria decision-making in health informatics using IoT
… the usage of MCDM techniques in various healthcare fields and … of usable security for the
healthcare management system was … This e-sq framework ID is concerned with evaluating the …
healthcare management system was … This e-sq framework ID is concerned with evaluating the …
[PDF][PDF] An Integrated Model for Ranking Risk Management in Industrial Internet of Things (IIoT) system
AA Salamai - Neutrosophic Sets and Systems, 2023 - digitalrepository.unm.edu
… review of the IIoT and our model are provided, with the concept of the IIoT and cyber physical
systems … AHP and TOPSIS methods to design a framework for assessing security in the IoT […
systems … AHP and TOPSIS methods to design a framework for assessing security in the IoT […
Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method
W Alhakami - Processes, 2023 - mdpi.com
… They presented the methods to use their framework to determine the dangers of a nuclear
power reactor plant’s protection systems, which are safety-grade digital systems. Their …
power reactor plant’s protection systems, which are safety-grade digital systems. Their …
Ranking security of IoT-based smart home consumer devices
NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
… Niazi, “ISA evaluation framework for security of internet of health things system using AHP-TOPSIS
methods,” in IEEE Access, vol. 8, pp. 152316–152332, 2020, doi: 10.1109/ACCESS.…
methods,” in IEEE Access, vol. 8, pp. 152316–152332, 2020, doi: 10.1109/ACCESS.…