Towards secure and intelligent internet of health things: A survey of enabling technologies and applications

U Zaman, Imran, F Mehmood, N Iqbal, J Kim, M Ibrahim - Electronics, 2022 - mdpi.com
With the growth of computing and communication technologies, the information processing
paradigm of the healthcare environment is evolving. The patient information is stored …

Evaluation of Risks and Security Controls for Industrial Components within Connected Manufacturing

A Giehl - 2024 - mediatum.ub.tum.de
We present an approach for conducting information security evaluations within
manufacturing. We describe a modeling method that allows to capture the wide variety of …

[PDF][PDF] Imran; Mehmood F; Iqbal, N.; Kim, J.; Ibrahim M. Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications …

U Zaman - 2022 - researchgate.net
With the growth of computing and communication technologies, the information processing
paradigm of the healthcare environment is evolving. The patient information is stored …

Decentralized Identity on Blockchain for a Multi-sided Network

AP Rao, S Dudaklyan - US Patent App. 17/651,164, 2023 - Google Patents
YSCNMFDFYJUPEF-OWOJBTEDSA-N 4, 4'-diisothiocyano-trans-stilbene-2, 2'-disulfonic
acid Chemical compound OS (= O)(= O) C1= CC (N= C= S)= CC= C1\C= C\C1= CC= C (N …

Tracking Down Software Cluster Bombs: A Health State Analysis of the Free Open-Source Software (Foss) Ecosystem

S Tatschner, MP Heinl, N Pappler, T Specht… - Available at SSRN … - papers.ssrn.com
More than once, computer history has shown that critical software vulnerabilities can have a
large and media-effective impact on affected components. In the Free and open-source …