A comprehensive study of the IoT cybersecurity in smart cities
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT),
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …
Data breaches in healthcare: security mechanisms for attack mitigation
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting
sensitive personal information. In this paper, we conduct a systematic review of existing …
sensitive personal information. In this paper, we conduct a systematic review of existing …
Privilege escalation attack detection and mitigation in cloud using machine learning
M Mehmood, R Amin, MMA Muslam, J Xie… - IEEE …, 2023 - ieeexplore.ieee.org
Because of the recent exponential rise in attack frequency and sophistication, the
proliferation of smart things has created significant cybersecurity challenges. Even though …
proliferation of smart things has created significant cybersecurity challenges. Even though …
An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment
In today's world, services are improved and advanced in every field of life. Especially in the
health sector, information technology (IT) plays a vigorous role in electronic health (e …
health sector, information technology (IT) plays a vigorous role in electronic health (e …
Data security in cloud environment using cryptographic mechanism
AA Fairosebanu, ACN Jebaseeli - Bulletin of Electrical Engineering and …, 2023 - beei.org
Virtual computing resources are provided via a cloud system that is both clever and
intelligent. Based on the user's request, computing resources are made available. A hybrid …
intelligent. Based on the user's request, computing resources are made available. A hybrid …
Developing a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System
A Alzahrani - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing provides best-in-class facilities to the healthcare system, a resource-
limited environment with low mobility, delay in transmission and non-intelligent disease …
limited environment with low mobility, delay in transmission and non-intelligent disease …
Intrusion detection method based on stacked sparse autoencoder and sliced GRU for connected healthcare systems
Z Gu, L Wang, J Li, M Wen, Y Liu - Arabian Journal for Science and …, 2023 - Springer
Connected healthcare systems face more and more cyber attacks recently. With the
development of technology, people use intrusion detection systems (IDS) to detect network …
development of technology, people use intrusion detection systems (IDS) to detect network …
LSP–eHS: A Lightweight and Secure Protocol for e-Healthcare System
Recent events dedicated to e-healthcare systems demonstrated that a critical mass of users
using e-health services and applications are being created and producing a tremendous …
using e-health services and applications are being created and producing a tremendous …
SAFE-HEALTH: A Secure Framework for Advancing Edge-Based Health 5.0
N Farhadighalati, NF Ghalaty… - 2023 IEEE 9th World …, 2023 - ieeexplore.ieee.org
Currently, the healthcare sector is transforming rapidly toward a computing-based approach.
Some factors such as live data assessment make cloud computing incompatible with …
Some factors such as live data assessment make cloud computing incompatible with …
A Hybrid and Multi-objective Approach for Data Leak and Tamper Detection in Healthcare Cloud Data
S Roychowdhury, BK Singh - … Intelligence: Select Proceedings of MAI 2022, 2023 - Springer
The emerging technology cloud computing has become a strong pillar beneath the digital
healthcare systems. Storing and maintaining the medical records in cloud has been proven …
healthcare systems. Storing and maintaining the medical records in cloud has been proven …