A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

An attribute-based access control for IoT using blockchain and smart contracts

SYA Zaidi, MA Shah, HA Khattak, C Maple, HT Rauf… - Sustainability, 2021 - mdpi.com
With opportunities brought by the Internet of Things (IoT), it is quite a challenge to maintain
concurrency and privacy when a huge number of resource-constrained distributed devices …

Achieving data privacy for decision support systems in times of massive data sharing

R Fazal, MA Shah, HA Khattak, HT Rauf… - Cluster Computing, 2022 - Springer
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The
collection of records for Covid-19 patients is necessary to tackle that situation. The decision …

[PDF][PDF] A survey of forensic analysis and information visualization approach for instant messaging applications

S Pirzada, NH Ab Rahman, NDW Cahyani… - International Journal of …, 2023 - academia.edu
WhatsApp, Viber, and WeChat, are moving beyond text messages to videos and voice calls,
which are proportioned to current media, files, and locations. In this study, we surveyed …

Advanced visualization of intrusions in flows by means of Beta-Hebbian learning

H Quintián, E Jove, JL Casteleiro-Roca… - Logic Journal of the …, 2022 - academic.oup.com
Detecting intrusions in large networks is a highly demanding task. In order to reduce the
computation demand of analysing every single packet travelling along one of such networks …

[PDF][PDF] Big data and machine learning in digital forensics: Predictive technology for proactive crime prevention

F Ekundayo - complexity, 2024 - researchgate.net
The integration of big data analytics and machine learning [ML] has transformed digital
forensics, enabling predictive technologies that proactively prevent cybercrimes and …

A Framework of Forensic Analysis and Visualization: Using WhatsApp Chat Data as a Case Study

S Pirzada, NH Ab Rahman, NDW Cahyani… - … : International Journal on …, 2024 - joiv.org
Digital forensic analysis involves studying and analyzing acquired evidence artifacts using
methodical approaches. However, unstructured data could be time-consuming and difficult …

IoMT and the Urban Tapestry: Weaving Healthcare Into Smart City Frameworks

J Kaur - Lightweight Digital Trust Architectures in the Internet of …, 2024 - igi-global.com
The incorporation of the internet of medical things (IoMT) into the urban tapestry inside smart
city frameworks holds the potential to bring about a significant change in the way healthcare …

[PDF][PDF] MODEL FOR SECURE TRANSMISSION OF MEDICAL TELEMONITORING DATA USING CRYPTO-STEGANO TECHNIQUES

EA AMUSAN, OM ALADE, J Ono - University of Pitesti Scientific …, 2024 - bulletin.feccupit.ro
This research proposes a hybrid security model for the secure transmission of patients'
health data in telemonitoring systems, integrating cryptography and steganography. This …