Results 141 to 150 of about 164,979 (324)
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Reference Ontology for Cybersecurity Operational Information [PDF]
Takeshi Takahashi, Youki Kadobayashi
openalex +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source
Secure and Efficient maTLS With Proxy Signature Scheme
Many companies providing mobile and web-based internet services deploy various middleboxes, including network and security appliances, to enhance network functionality and security. In particular, security appliances such as Web Application Firewalls and
Taehyun Ahn, Jiwon Kwak, Seungjoo Kim
doaj +1 more source
Some Fundamental Cybersecurity Concepts [PDF]
Kelce S. Wilson, Muge Ayse Kiy
openalex +1 more source
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam +3 more
wiley +1 more source
Cybersecurity activities for education and curriculum design: A survey
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such ...
Muhusina Ismail +6 more
doaj +1 more source
Controlling for Cybersecurity Risks of Medical Device Software [PDF]
Kevin Fu, James M. Blum
openalex +1 more source
Cybersecurity for "Open Science"
Presentation to the APLU Council on Research, September 9th ...
openaire +1 more source

