A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Reversible data hiding for electronic patient information security for telemedicine applications. [PDF]
Muhudin A +3 more
europepmc +1 more source
Methods of protecting network servers from unauthorized access [PDF]
Kovalenko, V., Коваленко, В.
core
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems. [PDF]
Yan M, Crane G, Suillivan D, Shan H.
europepmc +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Toward security-aware portable sequencing. [PDF]
Stillman C +3 more
europepmc +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Design of a multi-layered privacy-preserving architecture for secure medical data exchange in cloud environments. [PDF]
Muthuvel S, Priya S, Sampath Kumar K.
europepmc +1 more source
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source

