Security and Privacy Issues in Internet of Medical Things 2023
DOI: 10.1016/b978-0-323-89872-0.00012-5
|View full text |Cite
|
Sign up to set email alerts
|

Trust management in the Internet of medical things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The paper [11] depicted Threat Classification Model (TCM) using fuzzy logic (FL) for detection in real-time of a suitable privacy level for videos transmitting. Researchers [12], [13]discuss the recent developments in IoT privacy and security, points out unresolved problems, and offers areas for further research.To address [14]the issueswith response time, message failure, fault tolerance, and security offered by the blockchain, authors put forth heuristic methods.While reducing the reaction time for urgent communications and unloading the cloud infrastructure, the suggested method calls for only minor changes to the current Internet of Things ecosystem [15]. This study proposes a message scheduling for a blockchain-based architecture [16], and develop an efficient algorithm for cross-layer architecture at network and application level [17].The use of IoT and Blockchain technology allows for a smart technique of detecting and preventing COVID-19 victims [18]and authors [19]suggest auto detects encoder and secure the video output of very encoder.…”
Section: Related Workmentioning
confidence: 99%
“…The paper [11] depicted Threat Classification Model (TCM) using fuzzy logic (FL) for detection in real-time of a suitable privacy level for videos transmitting. Researchers [12], [13]discuss the recent developments in IoT privacy and security, points out unresolved problems, and offers areas for further research.To address [14]the issueswith response time, message failure, fault tolerance, and security offered by the blockchain, authors put forth heuristic methods.While reducing the reaction time for urgent communications and unloading the cloud infrastructure, the suggested method calls for only minor changes to the current Internet of Things ecosystem [15]. This study proposes a message scheduling for a blockchain-based architecture [16], and develop an efficient algorithm for cross-layer architecture at network and application level [17].The use of IoT and Blockchain technology allows for a smart technique of detecting and preventing COVID-19 victims [18]and authors [19]suggest auto detects encoder and secure the video output of very encoder.…”
Section: Related Workmentioning
confidence: 99%
“…Here are some common types of menstrual irregularities and their descriptions: Amenorrhea Amenorrhea refers to the absence of menstrual periods. [12] There are two main types: primary amenorrhea (absence of menstruation by age 16) and secondary amenorrhea (cessation of menstruation for at least 3 months in women who previously had regular periods).…”
Section: Types Of Menstrual Irregularitiesmentioning
confidence: 99%
“…Secondary amenorrhea refers to the absence of three or more periods continuously in a woman who has attained puberty [ 1 ]. Pregnancy is the most common cause of secondary amenorrhea.…”
mentioning
confidence: 99%