[HTML][HTML] A systematic literature review of attribute based encryption in health services

R Imam, K Kumar, SM Raza, R Sadaf, F Anwer… - Journal of King Saud …, 2022 - Elsevier
The widespread adoption of cloud technology in the healthcare industry has achieved
effective outcomes in sharing health records and sensitive data. In recent years, many …

Evaluation of autism spectrum disorder based on the healthcare by using artificial intelligence strategies

A Sundas, S Badotra, S Rani, R Gyaang - Journal of Sensors, 2023 - Wiley Online Library
The behaviors of children with autism spectrum disorder (ASD) are often erratic and difficult
to predict. Most of the time, they are unable to communicate effectively in their own …

Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach

AI Awad, M Shokry, AAM Khalaf… - Computers and Electrical …, 2023 - Elsevier
One of the crucial components of a smart grid is the advanced metering infrastructure (AMI),
which integrates information and communication technologies with a conventional electricity …

A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems

M Adam, M Hammoudeh, R Alrawashdeh… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) emerged as a pervasive technology, facilitating the seamless
interaction of devices, individuals, and services, enabling data exchange and task execution …

Insights on the internet of things: past, present, and future directions

T Sutikno, D Thalmann - … Computing Electronics and Control), 2022 - telkomnika.uad.ac.id
The internet of things (IoT) is rapidly expanding and improving operations in a wide range of
real-world applications, from consumer IoT and enterprise IoT to manufacturing and …

Improving IoT data security and integrity using lightweight blockchain dynamic table

SS Hameedi, O Bayat - Applied Sciences, 2022 - mdpi.com
Over the past few years, the Internet of Things (IoT) is one of the most significant
technologies ever used, as everything is connected to the Internet. Integrating IoT …

Federated learning empowered mobility-aware proactive content offloading framework for fog radio access networks

S Manzoor, AN Mian, A Zoha, MA Imran - Future Generation Computer …, 2022 - Elsevier
Proactive content caching has emerged as a promising solution to cope with exponentially
increasing mobile data traffic. The popular user contents can be cached near the network …

Enhanced Authentication for Decentralized IoT Access Control Architecture

JH Kang, M Seo - Cryptography, 2023 - mdpi.com
The internet of things (IoT) enables a hyperconnected society, offering intelligent services
and convenience through various connections between people, objects, and services …

A Leadership and Governance Stage Model (LGSM) in Digital Transformation in Data Management

S Yan, J Jones - European Conference on Management …, 2023 - books.google.com
In this era of digital transformation, organisations and individuals have the ability to
generate, collect, process, and analyse a vast volume of data to gain benefits and valuable …

Sistem informasi pengelolaan data laundry berbasis web pada Al Laundry Cikarang

M Yahya - JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 2024 - jurnal.mdp.ac.id
Al Laundry merupakan jasa cuci kiloan dan jasa cuci yang dihitung per item diantaranya
jasa cuci dan kering serta setrika seperti cuci pakaian, cuci badcover, cuci selimut, cuci …