A review of digital health and biotelemetry: modern approaches towards personalized medicine and remote health assessment
ȘS Busnatu, AG Niculescu, A Bolocan… - Journal of Personalized …, 2022 - mdpi.com
With the prevalence of digitalization in all aspects of modern society, health assessment is
becoming digital too. Taking advantage of the most recent technological advances and …
becoming digital too. Taking advantage of the most recent technological advances and …
Cybersecurity risk management framework for blockchain identity management systems in health IoT
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …
Management (IdM) systems for different information systems. Researchers widely use it to …
Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …
range of things and many types of communication technologies to share information. This …
Threat assessment and risk analysis (TARA) for interoperable medical devices in the operating room inspired by the automotive industry
A Puder, J Henle, E Sax - Healthcare, 2023 - mdpi.com
Prevailing trends in the automotive and medical device industry, such as life cycle
overarching configurability, connectivity, and automation, require an adaption of …
overarching configurability, connectivity, and automation, require an adaption of …
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment
As threat vectors and adversarial capabilities evolve, Cloud-Assisted Connected and
Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several …
Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several …
Hybrid anomaly detection model on trusted IoT devices
Most machine learning proposals in the Internet of Things (IoT) are designed and evaluated
on preprocessed data sets, where data acquisition and cleaning steps are often considered …
on preprocessed data sets, where data acquisition and cleaning steps are often considered …
A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road
safety, providing substantial societal and economic advantages. However, with the evolution …
safety, providing substantial societal and economic advantages. However, with the evolution …
A survey on cyber risk management for the Internet of Things
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the
daily operations of individuals and organisations. IoT systems automate crucial services …
daily operations of individuals and organisations. IoT systems automate crucial services …
Cybersecurity in health sector: a systematic review of the literature
CV Peve Herrera, JS Mendoza Valcarcel, M Díaz… - 2023 - repositorio.uwiener.edu.pe
Currently, health centers are being affected by various cyberattacks putting at risk the
confidential information of their patients and the organization because they do not have a …
confidential information of their patients and the organization because they do not have a …
Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation
In recent years, the healthcare-IT systems have undergone numerous technological
advancements. With the advent of implanted medical devices, the ubiquitous health is …
advancements. With the advent of implanted medical devices, the ubiquitous health is …