2020 Research, Innovation, Knowledge Management and Technology Application for Business Sustainability (INBUSH) 2020
DOI: 10.1109/inbush46973.2020.9392171
|View full text |Cite
|
Sign up to set email alerts
|

An overview of distributed denial of service and internet of things in healthcare devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Thus, the primary concern for cybersecurity relies upon intrusion detection [23], in which physical or cloud computer activities are monitored through analysis of system vulnerabilities and activity patterns [24]. Attacks may take the form of distributed denial of service (DDoS) [13], malicious IPs [25], and data manipulation [26], for instance, with ensuing outcomes such as loss of information, operational losses, and health damage [22,27].…”
Section: Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the primary concern for cybersecurity relies upon intrusion detection [23], in which physical or cloud computer activities are monitored through analysis of system vulnerabilities and activity patterns [24]. Attacks may take the form of distributed denial of service (DDoS) [13], malicious IPs [25], and data manipulation [26], for instance, with ensuing outcomes such as loss of information, operational losses, and health damage [22,27].…”
Section: Cybersecuritymentioning
confidence: 99%
“…China, for example, is creating new cybersecurity law and strategy [21]. Furthermore, while healthcare is currently a hot topic because there is an abundance of critical data, cyber defenses are on average weak in hospitals, where patients' lives and trust are at risk [22].…”
Section: Introductionmentioning
confidence: 99%
“…The primary concern for cyber security relies thus upon intrusion detection [23], in where physical or cloud computer activi-ties are monitored through analysis of system vulnerabilities and activity patterns [24]. The attacks could assume the form of, for example, Denial-Delay-of-Service (DDoS) [13], malicious IPs [25] and Data Manipulation [26], with ensuing outcomes, such as loss of information, operational losses and health damage [22,27].…”
Section: Cyber Securitymentioning
confidence: 99%
“…Developing thus a novel methodology for fingerprinting IoT devices, by building data-driven techniques rooted in machine learning methods, which allows to unveil compromised IP addresses throughout diverse geographical areas [5]. Also it focus on the issue of distributed denial of service (DDoS) scope, in terms of classifications and opportunities for attacks, particularly in the health sector, of limited security [22], while examining the changing legal environment in the IoT regulatory context [48]; 4.4. Industry 4.0 (IIoT) Industry 4.0 is another important subtheme related with IoT.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
See 1 more Smart Citation