Lessons From COVID-19 2022
DOI: 10.1016/b978-0-323-99878-9.00016-9
|View full text |Cite
|
Sign up to set email alerts
|

Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The proposed method was compared with the different conventional methods such as CNN [ 23 ], homomorphic [ 24 ], PBDL [ 25 ], GT-BSS [ 27 ], and AES [ 28 ] in terms of encryption time, decryption time, resource optimization, execution time, delay, key generation, and so on.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method was compared with the different conventional methods such as CNN [ 23 ], homomorphic [ 24 ], PBDL [ 25 ], GT-BSS [ 27 ], and AES [ 28 ] in terms of encryption time, decryption time, resource optimization, execution time, delay, key generation, and so on.…”
Section: Resultsmentioning
confidence: 99%
“…Additionally, AI systems regulate elements of malware and robot behavior that are impossible for humans to hold [ 25 ] manually. In the past, several security measures were put out to protect the transmission of patient data to hospitals [ 26 , 27 , 28 , 29 ]. However, the high cost and lengthy process prevent the best option from being implemented.…”
Section: Introductionmentioning
confidence: 99%
“…The rise in cyber threats and vulnerabilities has been significant during the COVID-19 pandemic, as the world shifted towards increased technology usage. A solution to this challenge is presented in this work [72] in the form of IoT-Attributes and Threat Analyzer for Tracing Malicious Traffic in Smart Sensor Environment (IoT-ATATMT). This tool allows for the analysis of traffic from both normal and suspicious smart devices, using various machine learning algorithms to detect and protect against cyber threats in the e-healthcare system through a specially curated dataset.…”
Section: Securing Of Healthcare Systemsmentioning
confidence: 99%
“…In terms of data collection and subsequent analysis, IoT devices can operate in real time, enabling them to make decisions based on these data and thereby reducing the need to store and process raw data. By storing data in the cloud, IoT devices facilitate remote monitoring and enable more efficient diagnostic and medical treatment processes [8].…”
Section: Introductionmentioning
confidence: 99%