When federated learning meets privacy-preserving computation
J Chen, H Yan, Z Liu, M Zhang, H Xiong… - ACM Computing Surveys, 2024 - dl.acm.org
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide
attention from society and individuals. It is desirable to make the data available but invisible …
attention from society and individuals. It is desirable to make the data available but invisible …
Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
IoT health devices: exploring security risks in the connected landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
Enhancing cybersecurity protocols in modern healthcare systems: Strategies and best practices
MU Tariq - Transformative Approaches to Patient Literacy and …, 2024 - igi-global.com
This chapter explores the crucial responsibility of strengthening cybersecurity measures
within the ever-changing context of contemporary healthcare systems. As digitalization gets …
within the ever-changing context of contemporary healthcare systems. As digitalization gets …
Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …
transformative advances and promising enhanced patient care, operational efficiency, and …
Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected
devices, known as the Internet of Health. The healthcare domain has been a target of …
devices, known as the Internet of Health. The healthcare domain has been a target of …
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …
across various domains. They gather data from the real environment and transmit it through …
Data breaches in healthcare: security mechanisms for attack mitigation
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting
sensitive personal information. In this paper, we conduct a systematic review of existing …
sensitive personal information. In this paper, we conduct a systematic review of existing …
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
J Maruthupandi, S Sivakumar, BL Dhevi, S Prasanna… - Scientific Reports, 2025 - nature.com
In recent times, there has been rapid growth of technologies that have enabled smart
infrastructures-IoT-powered smart grids, cities, and healthcare systems. But these resource …
infrastructures-IoT-powered smart grids, cities, and healthcare systems. But these resource …