[PDF][PDF] TRANSFORMING HEALTHCARE WITH FEDERATED LEARNING: SECURING FOG SYSTEMS FOR THE NEXT GENERATION

T ALKHDOUR, A ALI, M ALMAIAH, TTIN TIN… - Journal of Theoretical …, 2024 - jatit.org
Recent advancements in fog computing, coupled with the Internet of Things (IoT)
technology, encompass data analysis and artificial intelligence (AI) systems. Nonetheless …

[PDF][PDF] REAL TIME OF CYBERSECURITY RISKS DETECTION APPROACH FOR BLOCKCHAIN BASED PERSONAL MEDICAL DEVICES

T ALKHDOUR, AA MOHAMMED, ALI AITIZAZ… - Journal of Theoretical …, 2024 - jatit.org
Recent methods for storing and disseminating medical data limit user access to electronic
health records (EHR). It lowers care providers' access to vital information and ultimately …

[PDF][PDF] A HYBRID MODEL OF RSA AND NTRU FOR SECURING OF CLOUD COMPUTING

K ALTARAWNEH, I ALTARAWNI… - Journal of Theoretical …, 2024 - researchgate.net
Cryptographic techniques are essential in guaranteeing the security and confidentiality of
data in cloud computing, which is a critical concern. In order to provide a strong and secure …