A review of digital health and biotelemetry: modern approaches towards personalized medicine and remote health assessment

ȘS Busnatu, AG Niculescu, A Bolocan… - Journal of Personalized …, 2022 - mdpi.com
With the prevalence of digitalization in all aspects of modern society, health assessment is
becoming digital too. Taking advantage of the most recent technological advances and …

Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …

Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques

A Kumar, D Dhabliya, P Agarwal… - Computational …, 2022 - Wiley Online Library
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …

Threat assessment and risk analysis (TARA) for interoperable medical devices in the operating room inspired by the automotive industry

A Puder, J Henle, E Sax - Healthcare, 2023 - mdpi.com
Prevailing trends in the automotive and medical device industry, such as life cycle
overarching configurability, connectivity, and automation, require an adaption of …

Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment

AT Sheik, C Maple, G Epiphaniou, M Dianati - Sensors, 2023 - mdpi.com
As threat vectors and adversarial capabilities evolve, Cloud-Assisted Connected and
Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several …

Hybrid anomaly detection model on trusted IoT devices

PD Rosero-Montalvo, Z István, P Tözün… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Most machine learning proposals in the Internet of Things (IoT) are designed and evaluated
on preprocessed data sets, where data acquisition and cleaning steps are often considered …

A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application

AT Sheik, C Maple, G Epiphaniou, M Dianati - Information, 2023 - mdpi.com
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road
safety, providing substantial societal and economic advantages. However, with the evolution …

A survey on cyber risk management for the Internet of Things

EK Parsons, E Panaousis, G Loukas, G Sakellari - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the
daily operations of individuals and organisations. IoT systems automate crucial services …

Cybersecurity in health sector: a systematic review of the literature

CV Peve Herrera, JS Mendoza Valcarcel, M Díaz… - 2023 - repositorio.uwiener.edu.pe
Currently, health centers are being affected by various cyberattacks putting at risk the
confidential information of their patients and the organization because they do not have a …

Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation

M Aijaz, M Nazir, MNA Mohammad - SN Computer Science, 2023 - Springer
In recent years, the healthcare-IT systems have undergone numerous technological
advancements. With the advent of implanted medical devices, the ubiquitous health is …