A comprehensive study of the IoT cybersecurity in smart cities

RO Andrade, SG Yoo, L Tello-Oquendo… - IEEE …, 2020 - ieeexplore.ieee.org
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT),
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …

Data breaches in healthcare: security mechanisms for attack mitigation

L Nemec Zlatolas, T Welzer, L Lhotska - Cluster Computing, 2024 - Springer
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting
sensitive personal information. In this paper, we conduct a systematic review of existing …

Privilege escalation attack detection and mitigation in cloud using machine learning

M Mehmood, R Amin, MMA Muslam, J Xie… - IEEE …, 2023 - ieeexplore.ieee.org
Because of the recent exponential rise in attack frequency and sophistication, the
proliferation of smart things has created significant cybersecurity challenges. Even though …

An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

AUR Butt, T Mahmood, T Saba, SAO Bahaj… - IEEE …, 2023 - ieeexplore.ieee.org
In today's world, services are improved and advanced in every field of life. Especially in the
health sector, information technology (IT) plays a vigorous role in electronic health (e …

Data security in cloud environment using cryptographic mechanism

AA Fairosebanu, ACN Jebaseeli - Bulletin of Electrical Engineering and …, 2023 - beei.org
Virtual computing resources are provided via a cloud system that is both clever and
intelligent. Based on the user's request, computing resources are made available. A hybrid …

Developing a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System

A Alzahrani - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing provides best-in-class facilities to the healthcare system, a resource-
limited environment with low mobility, delay in transmission and non-intelligent disease …

Intrusion detection method based on stacked sparse autoencoder and sliced GRU for connected healthcare systems

Z Gu, L Wang, J Li, M Wen, Y Liu - Arabian Journal for Science and …, 2023 - Springer
Connected healthcare systems face more and more cyber attacks recently. With the
development of technology, people use intrusion detection systems (IDS) to detect network …

LSP–eHS: A Lightweight and Secure Protocol for e-Healthcare System

AD Algarni, F Algarni, SU Jan, N Innab - IEEE Access, 2024 - ieeexplore.ieee.org
Recent events dedicated to e-healthcare systems demonstrated that a critical mass of users
using e-health services and applications are being created and producing a tremendous …

SAFE-HEALTH: A Secure Framework for Advancing Edge-Based Health 5.0

N Farhadighalati, NF Ghalaty… - 2023 IEEE 9th World …, 2023 - ieeexplore.ieee.org
Currently, the healthcare sector is transforming rapidly toward a computing-based approach.
Some factors such as live data assessment make cloud computing incompatible with …

A Hybrid and Multi-objective Approach for Data Leak and Tamper Detection in Healthcare Cloud Data

S Roychowdhury, BK Singh - … Intelligence: Select Proceedings of MAI 2022, 2023 - Springer
The emerging technology cloud computing has become a strong pillar beneath the digital
healthcare systems. Storing and maintaining the medical records in cloud has been proven …