2021
DOI: 10.3390/electronics10121375
|View full text |Cite
|
Sign up to set email alerts
|

Security of Things Intrusion Detection System for Smart Healthcare

Abstract: Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart healthcare and will continue to be impactful in medical infrastructures in the near future. This paper addressed a key component of security-intrusion detection systems due to the number of web security attacks, which have increased dramatically in recent years in healthcare, as well as the privacy issues. Various intrusion-detection systems have been proposed in different works to detect cyber threats in smart healthcare… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(10 citation statements)
references
References 42 publications
(40 reference statements)
0
10
0
Order By: Relevance
“…The proposed model offers maximum accuracy of 99.21%, precision of 98.93%, and a detection rate of 99.59%. Iwendi et al ( 18 ) proposed an intrusion detection system in the Security of Things (SoT) paradigm for smart healthcare and will continue to impact medical infrastructures. Their study used the NSL-KDD dataset on RF, Naive Bayes (NB), and logistic regression classifiers for machine learning.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed model offers maximum accuracy of 99.21%, precision of 98.93%, and a detection rate of 99.59%. Iwendi et al ( 18 ) proposed an intrusion detection system in the Security of Things (SoT) paradigm for smart healthcare and will continue to impact medical infrastructures. Their study used the NSL-KDD dataset on RF, Naive Bayes (NB), and logistic regression classifiers for machine learning.…”
Section: Related Workmentioning
confidence: 99%
“…The development of a software defect detection model with high accuracy has proven to be a herculean task. Over the past decade, several approaches have been proposed, but most of them have not been able to meet the standards in their accuracy of predicting and detecting the defects [5,12]. According to [24]], the introduction of network computing technologies like cloud computing has provided users all around the world with an affordable and flexible network-based service provision scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed protocol was experimented on in the Ethereum platform, and researchers discovered that its computational efficacy was quite high. The authors of [32] discussed more on the use of blockchain in the healthcare sector and suggested a framework to execute blockchain-based technology for electronic health records.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The SHA-256 architecture is shown in Figure 9. This comprises additional modulo 2 32 and a bitwise rotation operation that uses different constants (ch, ∑ 1, Ma, and ∑ 0). The development of SHA-256 involves several phases, as discussed here.…”
Section: Secure Hash Algorithm-256 (Sha-256)mentioning
confidence: 99%