2016
DOI: 10.14257/ijsia.2016.10.2.28
|View full text |Cite
|
Sign up to set email alerts
|

Research on the Security Enhanced Smart Hardware Assisted Regression Analysis and Health Monitoring Technique based Expanded Training Exercise Effect Evaluation Model

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 30 publications
0
1
0
Order By: Relevance
“…Several studies voiced concerns about the speed and analysis of massive volumes of data [21,40,41] following data collection and processing [42,43], data management [2,44], and data monitoring. These potential difficulties must be addressed in order to assure the availability, dependability, and correctness of big data [28,45] and to aid decision-makers in making sound decisions [43,46]. b) Security and privacy: Both "security" and "privacy," which concentrate on data security, are related concepts.…”
Section: B Technical Reviewmentioning
confidence: 99%
“…Several studies voiced concerns about the speed and analysis of massive volumes of data [21,40,41] following data collection and processing [42,43], data management [2,44], and data monitoring. These potential difficulties must be addressed in order to assure the availability, dependability, and correctness of big data [28,45] and to aid decision-makers in making sound decisions [43,46]. b) Security and privacy: Both "security" and "privacy," which concentrate on data security, are related concepts.…”
Section: B Technical Reviewmentioning
confidence: 99%
“…Issues relating to speed and analysis of huge amounts of data [3,28,88] after data collection and processing [35,96], data management [8,23] and data monitoring were raised by several researchers. These potential issues need to be solved to ensure the availability, reliability, and accuracy of big data [89,103], as well as to assist the decision-makers in taking the right decision [94,96]. Nevertheless, a few studies highlighted the need to support the decision-making process by building a model on IoT-based platforms [26,100].…”
Section: -Internet Of Thingsmentioning
confidence: 99%
“…One of the most well-known types of attacks in this area is the Mirai attack, which can generate malicious and unusual traffic at several gigabits per second with the help of IoT devices [16,105]. Hence, authentication is the first step to ensure system security [32,74,101], while other studies have focused on the data security mechanism [84,94]. For example, the researcher Almaiah, proposed a creative hybrid model for authentication and reliable data retention in IoT-based healthcare software [52].…”
Section: -Security and Privacy Security And Privacy Have Been Reporte...mentioning
confidence: 99%
See 1 more Smart Citation