Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cybe...
Uloženo v:
| Vydáno v: | IEEE access Ročník 11; s. 145869 - 145896 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 2169-3536, 2169-3536 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR). A robust authentication mechanism based on machine learning and deep learning techniques is required to protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper, security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored and reported. |
|---|---|
| AbstractList | The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR). A robust authentication mechanism based on machine learning and deep learning techniques is required to protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper, security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored and reported. |
| Author | Dhirani, Lubna Luxmi Khatun, Mirza Akhi Memon, Sanober Farheen Eising, Ciaran |
| Author_xml | – sequence: 1 givenname: Mirza Akhi orcidid: 0009-0008-4718-187X surname: Khatun fullname: Khatun, Mirza Akhi email: Mirza.Akhi@ul.ie organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland – sequence: 2 givenname: Sanober Farheen orcidid: 0000-0001-9382-7354 surname: Memon fullname: Memon, Sanober Farheen organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland – sequence: 3 givenname: Ciaran orcidid: 0000-0001-8383-2635 surname: Eising fullname: Eising, Ciaran organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland – sequence: 4 givenname: Lubna Luxmi orcidid: 0000-0001-7654-4117 surname: Dhirani fullname: Dhirani, Lubna Luxmi organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland |
| BookMark | eNp9kU1rGzEQhkVJIWnqX5AeBD2vo4-V1urNmDRxcCjE6VnMamdtue4q1coN_veRvQ6EHjqHmWGY52WG9xM560KHhFxxNuacmevpbHazXI4FE3IsZamlYB_IheDaFFJJffauPyejvt-wHJM8UtUFuX8At_Yd0gVC7Hy3om2I9A5hm9YOIhbz8ESX6HbRp_03OqWP-NfjC4WuoY--_0UffPIrSD50n8nHFrY9jk71kvz8fvM0uysWP27ns-micCUzqXBMa45CCQQhQKlGA-OyBWkMcnQcnNBqwlosBVN1fsbxWgmuAKpaK3TykswH3SbAxj5H_xvi3gbw9jgIcWUhJu-2aEEbxp0UNWtZWetmUk4a1zqBwmDNqjJrfR20nmP4s8M-2U3YxS6fb4VhlSpz1nnLDFsuhr6P2Frn0_HnFMFvLWf24IQdnLAHJ-zJiczKf9i3i_9PfRkoj4jvCFlxmfMr5NiUiA |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1016_j_csi_2025_104053 crossref_primary_10_1007_s10462_024_11101_w crossref_primary_10_1016_j_procs_2025_03_302 crossref_primary_10_1186_s13638_025_02497_2 crossref_primary_10_3390_s25092779 crossref_primary_10_3390_computers14070250 crossref_primary_10_3390_s25185653 crossref_primary_10_1016_j_iot_2024_101068 crossref_primary_10_1016_j_iot_2024_101420 crossref_primary_10_1109_ACCESS_2025_3531659 crossref_primary_10_56294_hl2024_177 crossref_primary_10_1038_s41598_024_66392_4 crossref_primary_10_4108_eetpht_11_6170 crossref_primary_10_1159_000542288 |
| Cites_doi | 10.1007/978-3-030-51070-1_8 10.3390/s22197304 10.3390/s22041448 10.1007/978-3-031-16344-9_12 10.31185/wjcm.48 10.1007/s13198-015-0376-0 10.3390/s22093400 10.1007/s11277-021-09107-6 10.1109/COMST.2020.2973314 10.1109/ICACCAF.2017.8344724 10.1109/ICCSPA49915.2021.9385711 10.1002/widm.1485 10.1007/978-981-99-3668-7_5 10.1109/ACCESS.2020.3045115 10.1155/2022/6510934 10.1186/s40537-023-00704-9 10.1007/978-3-319-58280-1_10 10.1109/ICICCS48265.2020.9120906 10.1007/s42979-020-00205-z 10.1109/ICITST.2015.7412116 10.4018/978-1-7998-2454-1.ch071 10.1016/j.asoc.2023.110227 10.1016/j.enbuild.2023.112797 10.1109/COMST.2020.2988293 10.1007/s10586-023-04042-6 10.1201/9781003336624-4 10.1016/j.iot.2021.100393 10.1109/EIT.2018.8500144 10.1109/DCOSS52077.2021.00068 10.1016/j.jemep.2017.02.007 10.1109/IRASET52964.2022.9738218 10.23919/IConAC.2019.8895034 10.1109/ACCESS.2022.3216617 10.1109/ACCESS.2020.3026939 10.3390/s23083876 10.1109/TNSE.2023.3273301 10.1145/3558519 10.1016/j.iot.2021.100485 10.23919/cje.2022.00.282 10.1007/s13369-021-05985-x 10.1007/s40745-022-00444-2 10.1007/s10796-020-10056-x 10.1007/s11277-020-07546-1 10.1109/ICISC47916.2020.9171092 10.1016/j.ins.2022.10.060 10.3390/s21196346 10.1016/j.ijmedinf.2020.104087 10.1109/ACCESS.2023.3310242 10.3390/su141811403 10.1007/s42979-021-00592-x 10.1016/j.dsx.2020.04.012 10.3390/app13063828 10.5815/ijcnis.2020.04.02 10.1007/978-3-030-22868-2_90 10.1109/ICSSES58299.2023.10201156 10.1109/ICCES51350.2021.9489041 10.1109/JSAC.2020.3020654 10.1109/TVLSI.2021.3139904 10.1016/j.comcom.2020.12.003 10.1016/j.csa.2023.100016 10.1109/ACCESS.2020.3026260 10.3390/sym12071191 10.1109/ACCESS.2020.3000421 10.1109/jiot.2023.3283353 10.3390/s23084117 10.32604/csse.2023.039984 10.3390/s21113901 10.1109/ACCESS.2022.3205351 10.54808/WMSCI2022.01.6 10.1155/2019/4592902 10.1109/MSEC.2019.2902347 10.1002/int.23048 10.1016/j.iot.2019.100059 10.1016/j.comnet.2019.03.006 10.1007/s41635-017-0029-7 10.3390/brainsci13040683 10.1109/JIOT.2017.2749883 10.1007/978-981-15-8297-4_54 10.1109/COMST.2020.3036778 10.14569/IJACSA.2020.0110480 10.1109/MNET.001.1900105 10.4108/eetss.v8i30.590 10.1109/DCOSS.2019.00091 10.1007/s11036-022-01937-3 10.1109/SEGE.2019.8859950 10.1007/s40860-019-00079-w 10.1049/trit.2020.0073 10.1007/978-3-030-01560-2_5 10.1002/spy2.49 10.1109/COMST.2018.2874978 10.4018/978-1-6684-6413-7.ch008 10.12928/telkomnika.v18i4.15768 10.2147/JMDH.S419923 10.3390/s22062112 10.3390/s23031151 10.1016/B978-0-12-821472-5.00011-9 10.1109/ICSensT.2018.8603570 10.1109/TITS.2020.3028669 10.3390/app122211752 10.29304/jqcm.2023.15.3.1268 10.1109/COMST.2014.2320099 10.1109/MCC.2016.63 10.1109/AINA.2016.158 10.1109/WINCOM47513.2019.8942524 10.1109/LANMAN58293.2023.10189812 10.11591/ijece.v10i6.pp6461-6471 10.1109/INFOCOMWKSHPS54753.2022.9798301 10.1049/cit2.12078 10.1145/3411498.3419968 10.1016/j.future.2023.09.031 10.1109/ICCSA.2019.000-8 10.1109/TCSS.2022.3198123 10.1002/9781119795667.ch13 10.1016/j.micpro.2022.104622 10.1109/CSCWD.2017.8066704 10.1109/MCOM.2017.1600374CM 10.1109/SP.2009.33 10.1109/JIOT.2017.2778185 10.1109/AICAI.2019.8701238 10.1109/JPROC.2017.2761740 10.1109/SoutheastCon42311.2019.9020632 10.1201/9781003337218-11 10.1109/ICECA.2018.8474918 10.1007/s00521-022-06953-8 10.1109/ICCAIS48893.2020.9096818 10.1109/MIC.2021.3051675 10.1109/WCNC55385.2023.10118865 10.3390/electronics12061344 10.1016/j.nanoen.2023.108984 10.14569/IJACSA.2023.0140665 10.1109/WF-IoT.2016.7845455 10.5815/ijieeb.2020.05.03 10.1016/j.eswa.2023.120772 10.1007/978-3-030-05366-6_31 10.1016/j.health.2023.100177 10.1016/j.technovation.2022.102583 10.3390/app13031394 10.1002/ett.3935 10.1089/big.2022.0028 10.1145/3167486.3167554 10.1007/978-3-030-90083-0_7 10.3390/s20092649 10.1002/dac.4179 10.1007/978-3-031-45162-1_4 10.1145/3265639.3265652 10.1109/JIOT.2021.3062630 10.1016/j.measen.2022.100517 10.1109/BigData.2017.8258359 10.2991/ijcis.2018.25905181 10.1155/2021/5574376 10.1155/2014/357430 10.1109/ACCESS.2020.3004814 10.1016/j.ssaho.2020.100096 10.1007/978-981-99-0109-8 10.1007/s11277-020-07251-z 10.1007/978-981-15-4112-4_2 10.1109/ACCESS.2020.2984925 10.1002/9781119893998.ch13 10.1007/s10586-023-04069-9 10.1016/j.compeleceng.2022.108158 10.1007/978-3-031-40564-8_14 10.1002/9781118445112.stat06720.pub2 10.1016/j.compeleceng.2023.108626 10.1155/2020/8836927 10.1109/ACCESS.2022.3163580 10.3390/jcp2030027 10.37868/sei.v1i1.36 10.1007/978-3-031-29056-5_48 10.48161/qaj.v1n2a49 10.1109/IC3I56241.2022.10072727 10.1109/ACCESS.2021.3074125 10.1109/JIOT.2018.2878658 10.1016/j.compeleceng.2022.107691 10.1016/j.prime.2023.100158 10.1109/CBI.2017.27 10.1109/MCOM.2018.1700685 10.1109/ACCESS.2020.3020310 10.1201/9781003256243-6 10.1108/INTR-08-2019-0361 10.1145/3327961.3329530 10.1016/j.autcon.2019.01.023 10.1109/ISC2.2018.8656914 10.3390/en12193775 10.1109/ICCIT48885.2019.9038563 10.1016/j.jnca.2021.103179 10.3390/electronics12092050 10.12720/jcm.17.11.900-918 10.19101/IJACR.2019.940088 10.1007/s10877-023-01013-5 10.3390/fi9040093 10.1016/j.eswa.2021.116434 10.1155/2022/1863838 10.1109/JIOT.2022.3175669 10.1088/1742-6596/2007/1/012058 10.1109/ICIT52682.2021.9491114 10.1109/RBME.2020.3013489 10.1109/JSAC.2020.3020600 10.1109/JIOT.2019.2948149 10.1016/j.jpdc.2020.09.006 10.1016/j.comcom.2020.05.048 10.1109/INTECH.2016.7845081 10.1007/s12652-021-03302-w 10.1016/j.patcog.2017.10.030 10.3390/s22051959 10.1007/s41870-022-00869-1 10.3390/app12031353 10.5772/intechopen.110752 10.1109/ISNCC.2018.8530920 10.1109/COMST.2016.2582841 10.1016/j.maturitas.2018.04.008 10.3390/s22186765 10.1109/ACCESS.2021.3059858 10.1109/IWCMC58020.2023.10182654 10.1016/j.jksuci.2022.11.007 10.1007/978-3-030-24302-9_30 10.1016/j.imu.2023.101199 10.1186/s13635-020-00111-0 10.1016/j.ijleo.2022.170044 10.1007/s11831-022-09733-8 10.1109/IICCIT55816.2022.10010441 10.1016/j.jpdc.2022.01.030 10.4018/IJRQEH.289175 10.4018/978-1-7998-1253-1.ch003 10.3390/healthcare10112293 10.1109/GCWOT57803.2023.10064657 10.1007/s11227-018-2331-8 10.37868/sei.v3i1.124 10.3390/info8030077 10.1109/MNET.2019.1800083 10.1109/ICICOS.2017.8276353 10.3390/s17010130 10.1007/s40745-020-00253-5 10.54489/ijcim.v3i1.235 10.1007/978-981-16-3802-2_21 10.1016/j.jnca.2021.103164 10.3390/s23187843 10.1016/j.iot.2021.100420 10.1007/978-981-99-6353-9_8 10.1109/MCOM.001.2100035 10.1109/ICICICT46008.2019.8993264 10.1186/s13638-023-02261-4 10.3390/electronics12173541 10.1145/3241056 10.1201/9781003248750-2 10.1109/ACCESS.2022.3204051 10.1016/j.gltp.2022.03.030 10.1007/s10209-018-0618-4 10.1007/978-3-030-96040-7_10 10.1002/ett.4770 10.1109/CAIS.2019.8769560 10.2139/ssrn.4454407 10.1109/ICPS55917.2022.00046 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
| DOI | 10.1109/ACCESS.2023.3346320 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 145896 |
| ExternalDocumentID | oai_doaj_org_article_a6901c32b0f04b6d848dcfc2e29eb074 10_1109_ACCESS_2023_3346320 10371310 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Science Foundation Ireland (SFI) grantid: 18/CRT/6049 funderid: 10.13039/501100001602 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c409t-c0661e252ea22a55d6a013fa399e1ec1ac26580fe4205b320c1b5215aa7b65ec3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 19 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001132278500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:50:34 EDT 2025 Sun Jun 29 16:41:46 EDT 2025 Sat Nov 29 06:25:20 EST 2025 Tue Nov 18 21:07:26 EST 2025 Wed Aug 27 02:36:23 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c409t-c0661e252ea22a55d6a013fa399e1ec1ac26580fe4205b320c1b5215aa7b65ec3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7654-4117 0009-0008-4718-187X 0000-0001-8383-2635 0000-0001-9382-7354 |
| OpenAccessLink | https://doaj.org/article/a6901c32b0f04b6d848dcfc2e29eb074 |
| PQID | 2907542906 |
| PQPubID | 4845423 |
| PageCount | 28 |
| ParticipantIDs | proquest_journals_2907542906 doaj_primary_oai_doaj_org_article_a6901c32b0f04b6d848dcfc2e29eb074 crossref_citationtrail_10_1109_ACCESS_2023_3346320 crossref_primary_10_1109_ACCESS_2023_3346320 ieee_primary_10371310 |
| PublicationCentury | 2000 |
| PublicationDate | 20230000 2023-00-00 20230101 2023-01-01 |
| PublicationDateYYYYMMDD | 2023-01-01 |
| PublicationDate_xml | – year: 2023 text: 20230000 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2023 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref207 ref56 ref208 ref205 ref206 ref53 ref203 (ref86) 2023 ref204 ref55 ref201 ref54 ref202 ref209 ref210 ref211 ref51 ref50 ref218 ref219 ref48 ref216 ref47 ref217 ref42 ref214 ref41 ref215 ref44 ref212 ref43 ref213 ref49 ref8 ref7 ref9 Bekkali (ref59) 2022; 21 ref4 ref3 ref6 ref100 ref221 ref101 ref222 ref40 ref220 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 Albalawi (ref58) 2022; 100 ref28 (ref103) 2022 ref27 ref29 DiMaggio (ref66) 2022 ref200 ref128 ref249 ref97 ref126 ref247 ref96 ref127 ref248 ref99 ref124 ref245 ref125 ref246 ref93 ref254 ref92 ref134 ref255 ref95 ref131 ref252 ref94 ref132 ref253 ref250 ref130 ref91 ref90 ref89 ref137 ref258 ref259 ref88 ref135 ref256 ref87 ref136 ref257 (ref85) 2023 (ref133) 2021 ref144 ref265 ref145 ref266 ref84 ref142 ref263 ref83 ref143 ref264 ref140 ref261 ref141 ref262 ref260 ref79 ref108 ref229 ref78 ref109 ref106 ref227 ref107 ref228 ref75 ref104 ref225 ref74 ref105 ref226 ref77 ref102 ref223 ref76 ref224 ref71 ref111 ref232 ref70 ref112 ref233 ref73 ref230 ref72 ref110 ref231 ref68 ref119 ref67 ref117 ref238 ref69 ref118 ref239 ref64 ref115 ref63 ref116 ref237 ref113 ref234 ref114 ref235 (ref11) 2023 ref60 ref243 ref123 ref244 ref62 ref120 ref241 ref61 ref121 ref242 Varadharajan (ref81) 2018 Rohith (ref236); 420 ref240 ref168 ref169 McKeon (ref176) 2023 ref170 ref177 ref178 ref173 ref174 ref171 ref172 ref179 ref180 ref181 ref189 ref186 Comfort (ref138) 2023 ref187 ref184 Datta (ref251) 2020 ref185 ref182 Phillips (ref175) 2023 ref183 Mattioli (ref46) 2023 ref148 ref269 ref149 ref146 ref267 ref147 ref268 ref155 ref276 ref156 ref277 ref153 ref274 ref154 ref275 ref151 ref272 ref152 ref273 ref270 Cvitić (ref65) 2015; 26 ref150 ref271 Raj (ref139) 2023 Ahuja (ref129) 2023; 38 ref159 ref157 ref278 ref158 ref279 ref280 ref166 ref167 ref164 ref165 ref162 ref163 ref160 ref161 ref13 ref12 ref14 ref10 ref17 ref16 ref19 ref18 Khatkar (ref188) 2023; 14 Sonar (ref98) 2014; 10 Hanson (ref15) 2022 (ref82) 2022 Kost (ref45) 2023 Jannat (ref122) 2023; 3 Wickramasinghe (ref5) 2019 Alkhathami (ref52) 2022; 100 ref2 ref1 ref191 ref192 ref190 ref199 ref197 ref198 ref195 ref196 ref193 ref194 (ref80) 2023 |
| References_xml | – ident: ref7 doi: 10.1007/978-3-030-51070-1_8 – ident: ref22 doi: 10.3390/s22197304 – ident: ref75 doi: 10.3390/s22041448 – ident: ref140 doi: 10.1007/978-3-031-16344-9_12 – ident: ref118 doi: 10.31185/wjcm.48 – ident: ref141 doi: 10.1007/s13198-015-0376-0 – ident: ref206 doi: 10.3390/s22093400 – ident: ref109 doi: 10.1007/s11277-021-09107-6 – ident: ref33 doi: 10.1109/COMST.2020.2973314 – ident: ref53 doi: 10.1109/ICACCAF.2017.8344724 – ident: ref29 doi: 10.1109/ICCSPA49915.2021.9385711 – ident: ref20 doi: 10.1002/widm.1485 – ident: ref54 doi: 10.1007/978-981-99-3668-7_5 – ident: ref19 doi: 10.1109/ACCESS.2020.3045115 – volume: 38 start-page: 3033 issue: 3 year: 2023 ident: ref129 article-title: Improved heuristic framework for cyber security system on DDoS attack publication-title: J. Data Acquisition Process. – ident: ref88 doi: 10.1155/2022/6510934 – ident: ref163 doi: 10.1186/s40537-023-00704-9 – ident: ref155 doi: 10.1007/978-3-319-58280-1_10 – ident: ref164 doi: 10.1109/ICICCS48265.2020.9120906 – ident: ref35 doi: 10.1007/s42979-020-00205-z – ident: ref56 doi: 10.1109/ICITST.2015.7412116 – ident: ref221 doi: 10.4018/978-1-7998-2454-1.ch071 – year: 2020 ident: ref251 article-title: A survey on activation functions and their relation with xavier and he normal initialization publication-title: arXiv:2004.06632 – ident: ref240 doi: 10.1016/j.asoc.2023.110227 – ident: ref234 doi: 10.1016/j.enbuild.2023.112797 – ident: ref177 doi: 10.1109/COMST.2020.2988293 – ident: ref127 doi: 10.1007/s10586-023-04042-6 – ident: ref207 doi: 10.1201/9781003336624-4 – ident: ref228 doi: 10.1016/j.iot.2021.100393 – volume: 420 start-page: 283 volume-title: Proc. 21st Int. Conf. Hybrid Intell. Syst. (HIS) ident: ref236 article-title: Sentiment analysis of IMDb movie reviews: A comparative analysis of feature selection and feature extraction techniques – ident: ref51 doi: 10.1109/EIT.2018.8500144 – ident: ref30 doi: 10.1109/DCOSS52077.2021.00068 – ident: ref202 doi: 10.1016/j.jemep.2017.02.007 – ident: ref216 doi: 10.1109/IRASET52964.2022.9738218 – ident: ref67 doi: 10.23919/IConAC.2019.8895034 – ident: ref225 doi: 10.1109/ACCESS.2022.3216617 – ident: ref70 doi: 10.1109/ACCESS.2020.3026939 – ident: ref169 doi: 10.3390/s23083876 – ident: ref256 doi: 10.1109/TNSE.2023.3273301 – ident: ref272 doi: 10.1145/3558519 – ident: ref152 doi: 10.1016/j.iot.2021.100485 – volume-title: Edge to Core and the Internet of Things and Data Placement year: 2023 ident: ref11 – ident: ref92 doi: 10.23919/cje.2022.00.282 – ident: ref214 doi: 10.1007/s13369-021-05985-x – ident: ref227 doi: 10.1007/s40745-022-00444-2 – ident: ref229 doi: 10.1007/s10796-020-10056-x – ident: ref104 doi: 10.1007/s11277-020-07546-1 – ident: ref203 doi: 10.1109/ICISC47916.2020.9171092 – ident: ref260 doi: 10.1016/j.ins.2022.10.060 – volume: 21 start-page: 25 year: 2022 ident: ref59 article-title: Systematic literature review of Internet of Things (IoT) security publication-title: Adv. Indynamical Syst. Appl. – ident: ref217 doi: 10.3390/s21196346 – ident: ref180 doi: 10.1016/j.ijmedinf.2020.104087 – ident: ref110 doi: 10.1109/ACCESS.2023.3310242 – ident: ref237 doi: 10.3390/su141811403 – ident: ref223 doi: 10.1007/s42979-021-00592-x – ident: ref182 doi: 10.1016/j.dsx.2020.04.012 – ident: ref277 doi: 10.3390/app13063828 – ident: ref201 doi: 10.5815/ijcnis.2020.04.02 – ident: ref145 doi: 10.1007/978-3-030-22868-2_90 – ident: ref43 doi: 10.1109/ICSSES58299.2023.10201156 – ident: ref84 doi: 10.1109/ICCES51350.2021.9489041 – ident: ref17 doi: 10.1109/JSAC.2020.3020654 – ident: ref254 doi: 10.1109/TVLSI.2021.3139904 – ident: ref243 doi: 10.1016/j.comcom.2020.12.003 – ident: ref185 doi: 10.1016/j.csa.2023.100016 – ident: ref242 doi: 10.1109/ACCESS.2020.3026260 – ident: ref154 doi: 10.3390/sym12071191 – ident: ref196 doi: 10.1109/ACCESS.2020.3000421 – ident: ref170 doi: 10.1109/jiot.2023.3283353 – ident: ref212 doi: 10.3390/s23084117 – ident: ref241 doi: 10.32604/csse.2023.039984 – ident: ref1 doi: 10.3390/s21113901 – ident: ref125 doi: 10.1109/ACCESS.2022.3205351 – ident: ref77 doi: 10.54808/WMSCI2022.01.6 – ident: ref250 doi: 10.1155/2019/4592902 – ident: ref232 doi: 10.1109/MSEC.2019.2902347 – ident: ref128 doi: 10.1002/int.23048 – ident: ref258 doi: 10.1016/j.iot.2019.100059 – ident: ref41 doi: 10.1016/j.comnet.2019.03.006 – volume-title: Cyber Resilience Act, Shaping Europe’s Digital Future, Legislative Proposal COM (2022) 713 Final year: 2022 ident: ref82 – ident: ref68 doi: 10.1007/s41635-017-0029-7 – ident: ref226 doi: 10.3390/brainsci13040683 – ident: ref209 doi: 10.1109/JIOT.2017.2749883 – ident: ref61 doi: 10.1007/978-981-15-8297-4_54 – ident: ref224 doi: 10.1109/COMST.2020.3036778 – ident: ref73 doi: 10.14569/IJACSA.2020.0110480 – ident: ref239 doi: 10.1109/MNET.001.1900105 – ident: ref134 doi: 10.4108/eetss.v8i30.590 – ident: ref39 doi: 10.1109/DCOSS.2019.00091 – ident: ref55 doi: 10.1007/s11036-022-01937-3 – year: 2023 ident: ref176 article-title: Biggest healthcare data breaches reported this year, so far – ident: ref264 doi: 10.1109/SEGE.2019.8859950 – ident: ref166 doi: 10.1007/s40860-019-00079-w – ident: ref238 doi: 10.1049/trit.2020.0073 – ident: ref153 doi: 10.1007/978-3-030-01560-2_5 – ident: ref105 doi: 10.1002/spy2.49 – ident: ref108 doi: 10.1109/COMST.2018.2874978 – volume-title: Nursing Rights of Medication Administration year: 2022 ident: ref15 – ident: ref268 doi: 10.4018/978-1-6684-6413-7.ch008 – ident: ref208 doi: 10.12928/telkomnika.v18i4.15768 – ident: ref279 doi: 10.2147/JMDH.S419923 – ident: ref74 doi: 10.3390/s22062112 – ident: ref137 doi: 10.3390/s23031151 – ident: ref8 doi: 10.1016/B978-0-12-821472-5.00011-9 – volume-title: The NIS 2 Directive year: 2022 ident: ref103 – ident: ref162 doi: 10.1109/ICSensT.2018.8603570 – ident: ref248 doi: 10.1109/TITS.2020.3028669 – ident: ref149 doi: 10.3390/app122211752 – ident: ref280 doi: 10.29304/jqcm.2023.15.3.1268 – ident: ref245 doi: 10.1109/COMST.2014.2320099 – ident: ref49 doi: 10.1109/MCC.2016.63 – ident: ref246 doi: 10.1109/AINA.2016.158 – ident: ref89 doi: 10.1109/WINCOM47513.2019.8942524 – ident: ref167 doi: 10.1109/LANMAN58293.2023.10189812 – ident: ref266 doi: 10.1109/COMST.2020.2973314 – ident: ref72 doi: 10.11591/ijece.v10i6.pp6461-6471 – ident: ref99 doi: 10.1109/INFOCOMWKSHPS54753.2022.9798301 – ident: ref113 doi: 10.1049/cit2.12078 – ident: ref106 doi: 10.1145/3411498.3419968 – ident: ref95 doi: 10.1016/j.future.2023.09.031 – volume-title: Directive on Measures for a High Common Level of Cybersecurity Across the Union (NIS2 Directive) year: 2023 ident: ref85 – ident: ref210 doi: 10.1109/ICCSA.2019.000-8 – ident: ref231 doi: 10.1109/TCSS.2022.3198123 – ident: ref230 doi: 10.1002/9781119795667.ch13 – volume: 14 start-page: 685 issue: 1 year: 2023 ident: ref188 article-title: Parametric influence of intrusion detection system in healthcare sector using deep neural [LSTM] network publication-title: J. Pharmaceutical Negative Results – ident: ref197 doi: 10.1016/j.micpro.2022.104622 – ident: ref147 doi: 10.1109/CSCWD.2017.8066704 – ident: ref275 doi: 10.1109/MCOM.2017.1600374CM – year: 2023 ident: ref175 article-title: Healthcare cybersecurity in 2023: Hive’s shutdown is good news but cyberattacks are only getting worse publication-title: Insider Intell. – ident: ref142 doi: 10.1109/SP.2009.33 – ident: ref63 doi: 10.1109/JIOT.2017.2778185 – ident: ref115 doi: 10.1109/AICAI.2019.8701238 – ident: ref253 doi: 10.1109/JPROC.2017.2761740 – ident: ref191 doi: 10.1109/SoutheastCon42311.2019.9020632 – ident: ref267 doi: 10.1201/9781003337218-11 – volume: 100 start-page: 1 issue: 15 year: 2022 ident: ref52 article-title: Detection of SQL injection attacks using machine learning in cloud computing platform publication-title: J. Theor. Appl. Inf. Technol. – ident: ref38 doi: 10.1109/ICECA.2018.8474918 – ident: ref255 doi: 10.1007/s00521-022-06953-8 – ident: ref100 doi: 10.1109/ICCAIS48893.2020.9096818 – ident: ref14 doi: 10.1109/MIC.2021.3051675 – ident: ref25 doi: 10.1109/WCNC55385.2023.10118865 – ident: ref143 doi: 10.3390/electronics12061344 – ident: ref23 doi: 10.1016/j.nanoen.2023.108984 – volume: 100 start-page: 2988 year: 2022 ident: ref58 article-title: Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment publication-title: J. Theor. Appl. Inf. Technol – ident: ref18 doi: 10.14569/IJACSA.2023.0140665 – ident: ref168 doi: 10.1109/WF-IoT.2016.7845455 – volume-title: The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime year: 2022 ident: ref66 – ident: ref116 doi: 10.5815/ijieeb.2020.05.03 – ident: ref194 doi: 10.1016/j.eswa.2023.120772 – ident: ref259 doi: 10.1007/978-3-030-05366-6_31 – ident: ref271 doi: 10.1016/j.health.2023.100177 – ident: ref183 doi: 10.1016/j.technovation.2022.102583 – ident: ref27 doi: 10.3390/app13031394 – ident: ref111 doi: 10.1002/ett.3935 – ident: ref262 doi: 10.1089/big.2022.0028 – ident: ref78 doi: 10.1145/3167486.3167554 – ident: ref159 doi: 10.1007/978-3-030-90083-0_7 – ident: ref181 doi: 10.3390/s20092649 – ident: ref13 doi: 10.1002/dac.4179 – ident: ref83 doi: 10.1007/978-3-031-45162-1_4 – ident: ref112 doi: 10.1145/3265639.3265652 – ident: ref204 doi: 10.1109/JIOT.2021.3062630 – ident: ref270 doi: 10.1016/j.measen.2022.100517 – ident: ref247 doi: 10.1109/BigData.2017.8258359 – ident: ref48 doi: 10.2991/ijcis.2018.25905181 – ident: ref9 doi: 10.1155/2021/5574376 – ident: ref102 doi: 10.1155/2014/357430 – ident: ref87 doi: 10.1109/ACCESS.2020.3004814 – ident: ref165 doi: 10.1016/j.ssaho.2020.100096 – ident: ref171 doi: 10.1007/978-981-99-0109-8 – ident: ref123 doi: 10.1007/s11277-020-07251-z – ident: ref179 doi: 10.1007/978-981-15-4112-4_2 – ident: ref36 doi: 10.1109/ACCESS.2020.2984925 – ident: ref126 doi: 10.1002/9781119893998.ch13 – ident: ref276 doi: 10.1007/s10586-023-04069-9 – ident: ref195 doi: 10.1016/j.compeleceng.2022.108158 – ident: ref93 doi: 10.1007/978-3-031-40564-8_14 – ident: ref158 doi: 10.1002/9781118445112.stat06720.pub2 – ident: ref187 doi: 10.1016/j.compeleceng.2023.108626 – ident: ref21 doi: 10.1155/2020/8836927 – ident: ref60 doi: 10.1109/ACCESS.2022.3163580 – ident: ref218 doi: 10.3390/jcp2030027 – ident: ref101 doi: 10.37868/sei.v1i1.36 – ident: ref96 doi: 10.1007/978-3-031-29056-5_48 – ident: ref50 doi: 10.48161/qaj.v1n2a49 – ident: ref124 doi: 10.1109/IC3I56241.2022.10072727 – ident: ref71 doi: 10.1109/ACCESS.2021.3074125 – ident: ref26 doi: 10.1109/JIOT.2018.2878658 – ident: ref40 doi: 10.1016/j.compeleceng.2022.107691 – ident: ref47 doi: 10.1016/j.prime.2023.100158 – ident: ref12 doi: 10.1109/CBI.2017.27 – ident: ref130 doi: 10.1109/MCOM.2018.1700685 – ident: ref69 doi: 10.1109/ACCESS.2020.3020310 – ident: ref233 doi: 10.1201/9781003256243-6 – volume: 3 start-page: 1 year: 2023 ident: ref122 article-title: Proposed on attack analysis using risk assessment and security risk assessment using attacks for cloud cyber security publication-title: Comput. Sci. – ident: ref172 doi: 10.1108/INTR-08-2019-0361 – ident: ref263 doi: 10.1145/3327961.3329530 – ident: ref131 doi: 10.1016/j.autcon.2019.01.023 – year: 2023 ident: ref46 article-title: ENISA foresight cybersecurity threats for 2030 – ident: ref178 doi: 10.1109/ISC2.2018.8656914 – ident: ref44 doi: 10.3390/en12193775 – ident: ref135 doi: 10.1109/ICCIT48885.2019.9038563 – ident: ref42 doi: 10.1016/j.jnca.2021.103179 – ident: ref186 doi: 10.3390/electronics12092050 – ident: ref57 doi: 10.12720/jcm.17.11.900-918 – ident: ref90 doi: 10.19101/IJACR.2019.940088 – ident: ref184 doi: 10.1007/s10877-023-01013-5 – ident: ref3 doi: 10.3390/fi9040093 – ident: ref16 doi: 10.1016/j.eswa.2021.116434 – ident: ref261 doi: 10.1155/2022/1863838 – ident: ref278 doi: 10.1109/JIOT.2022.3175669 – ident: ref121 doi: 10.1088/1742-6596/2007/1/012058 – volume: 10 start-page: 58 issue: 11 year: 2014 ident: ref98 article-title: A survey: DDoS attack on Internet of Things publication-title: Int. J. Eng. Res. Develop. – ident: ref76 doi: 10.1109/ICIT52682.2021.9491114 – ident: ref34 doi: 10.1109/RBME.2020.3013489 – ident: ref6 doi: 10.1109/JSAC.2020.3020600 – ident: ref107 doi: 10.1109/JIOT.2019.2948149 – ident: ref119 doi: 10.1016/j.jpdc.2020.09.006 – ident: ref200 doi: 10.1016/j.comcom.2020.05.048 – ident: ref132 doi: 10.1109/INTECH.2016.7845081 – ident: ref273 doi: 10.1007/s12652-021-03302-w – ident: ref252 doi: 10.1016/j.patcog.2017.10.030 – ident: ref120 doi: 10.3390/s22051959 – ident: ref198 doi: 10.1007/s41870-022-00869-1 – ident: ref146 doi: 10.3390/app12031353 – year: 2018 ident: ref81 article-title: Study of security attacks against IoT infrastructures – ident: ref269 doi: 10.5772/intechopen.110752 – ident: ref274 doi: 10.1109/ISNCC.2018.8530920 – ident: ref64 doi: 10.1109/COMST.2016.2582841 – ident: ref192 doi: 10.1016/j.maturitas.2018.04.008 – ident: ref211 doi: 10.3390/s22186765 – ident: ref31 doi: 10.1109/ACCESS.2021.3059858 – ident: ref189 doi: 10.1109/IWCMC58020.2023.10182654 – ident: ref193 doi: 10.1016/j.jksuci.2022.11.007 – ident: ref148 doi: 10.1007/978-3-030-24302-9_30 – ident: ref161 doi: 10.1016/j.imu.2023.101199 – volume-title: As Biohacking Evolves, How Vulnerable are we to Cyber Threats? year: 2023 ident: ref80 – year: 2023 ident: ref138 article-title: German banking regulator BaFin’s website hit by cyber attack – ident: ref173 doi: 10.1186/s13635-020-00111-0 – ident: ref199 doi: 10.1016/j.ijleo.2022.170044 – ident: ref28 doi: 10.1007/s11831-022-09733-8 – ident: ref249 doi: 10.1109/IICCIT55816.2022.10010441 – volume: 26 start-page: 1 issue: 1 year: 2015 ident: ref65 article-title: Classification of security risks in the IoT environment publication-title: Ann. DAAAM – ident: ref114 doi: 10.1016/j.jpdc.2022.01.030 – ident: ref265 doi: 10.4018/IJRQEH.289175 – ident: ref150 doi: 10.4018/978-1-7998-1253-1.ch003 – ident: ref190 doi: 10.3390/healthcare10112293 – year: 2023 ident: ref86 article-title: Complete guide to GDPR compliance – ident: ref2 doi: 10.1109/GCWOT57803.2023.10064657 – ident: ref24 doi: 10.1007/s11227-018-2331-8 – volume-title: Delivering Superior Health and Wellness Management With IoT and Analytics year: 2019 ident: ref5 – ident: ref62 doi: 10.37868/sei.v3i1.124 – ident: ref205 doi: 10.3390/info8030077 – ident: ref244 doi: 10.1109/MNET.2019.1800083 – ident: ref220 doi: 10.1109/ICICOS.2017.8276353 – ident: ref4 doi: 10.3390/s17010130 – ident: ref222 doi: 10.1007/s40745-020-00253-5 – volume-title: 14 Biggest Healthcare Data Breaches [Updated 2023] year: 2023 ident: ref45 – ident: ref160 doi: 10.54489/ijcim.v3i1.235 – ident: ref235 doi: 10.1007/978-981-16-3802-2_21 – ident: ref32 doi: 10.1016/j.jnca.2021.103164 – ident: ref91 doi: 10.3390/s23187843 – ident: ref174 doi: 10.1016/j.iot.2021.100420 – ident: ref219 doi: 10.1007/978-981-99-6353-9_8 – year: 2023 ident: ref139 article-title: Critical infrastructure cyberattack on Japan’s biggest port – ident: ref156 doi: 10.1109/MCOM.001.2100035 – ident: ref117 doi: 10.1109/ICICICT46008.2019.8993264 – ident: ref213 doi: 10.1186/s13638-023-02261-4 – ident: ref257 doi: 10.3390/electronics12173541 – ident: ref157 doi: 10.1145/3241056 – ident: ref10 doi: 10.1201/9781003248750-2 – ident: ref144 doi: 10.1109/ACCESS.2022.3204051 – ident: ref151 doi: 10.1016/j.gltp.2022.03.030 – ident: ref37 doi: 10.1007/s10209-018-0618-4 – ident: ref97 doi: 10.1007/978-3-030-96040-7_10 – year: 2021 ident: ref133 article-title: Conti cyber attack on the HSE – ident: ref94 doi: 10.1002/ett.4770 – ident: ref79 doi: 10.1109/CAIS.2019.8769560 – ident: ref215 doi: 10.2139/ssrn.4454407 – ident: ref136 doi: 10.1109/ICPS55917.2022.00046 |
| SSID | ssj0000816957 |
| Score | 2.4514341 |
| Snippet | The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices... |
| SourceID | doaj proquest crossref ieee |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 145869 |
| SubjectTerms | 5G mobile communication 5G NR 5G-IoT Anomalies anomaly detection attacks Blood pressure Command and control Cybersecurity Data integrity Deep learning generative AI Generative artificial intelligence Health care Healthcare-IoT Internet of medical things Internet of Things Machine learning Medical services mitigation techniques Monitoring Narrowband Privacy Risk Security security and privacy challenges Sensors Temperature sensors |
| SummonAdditionalLinks | – databaseName: IEEE Xplore dbid: RIE link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwGA0qPuiDd3HeyIOPdktz6-rbHIqKE_HG3kKSfpWhdLJNf79Jmo2BKPhWSkLTnKbfyeU7B6ETo0XmIplJqOYk4dyaxADIhIEjI7xgIgu5MC-32d1du9_P72OyesiFAYBw-Aya_jLs5RdD--mXylo-py1lPqFqMctknaw1W1DxDhK5yKKyUEryVqfbdS_R9AbhTca4ZN7Uey76BJH-6Kry41cc4svl-j9btoHWIpHEnRr5TbQA1RZanZMX3EY3vXBSEnAUUX3FjqHiq9mJr-R6-IQfo4HdGe7geqMA66rAD4PxG-4NagWOYbWDni8vnrpXSfROSKybsU0S6wBIgQoKmlItRCG1I3uldnwEUrCpttRxD1ICp0QY1zM2NS6SC60zIwVYtouWqmEFewjr1IKjVaKURcEd3ckl956T3Iq2ZpZBA9FpnyobhcW9v8W7ChMMkqsaCOWBUBGIBjqdVfqodTX-Ln7uwZoV9aLY4YZDQcUxprQ317KMGlISbmTR5u3ClpYCzcE4qtRAOx65uefVoDXQ4RR7FUfwWNGceHPgnMj9X6odoBXfxHo95hAtTUafcISW7ddkMB4dh4_zG_4e30Y priority: 102 providerName: IEEE |
| Title | Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation |
| URI | https://ieeexplore.ieee.org/document/10371310 https://www.proquest.com/docview/2907542906 https://doaj.org/article/a6901c32b0f04b6d848dcfc2e29eb074 |
| Volume | 11 |
| WOSCitedRecordID | wos001132278500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUqxKEcUGlB3RaQDz024PgrcW_LCkSrLqr4EjfLdibVqlW2YheO_e2MHbOKhAQXLjlETpwZTzxvEvs9Qr54pyrMZL7gTrJCyuALD6ALAQhGZCNUlfbCXP-szs7qmxvzayD1FdeE9fTAveMOXVRMCoJ71jLpdVPLuglt4MANeMx_cfZllRkUU2kOrkttVJVphkpmDseTCVp0ENXCD4SQWkSF70EqSoz9WWLlybycks3JO7KZUSId90-3Rd5A955sDLgDP5Af07QMEmhmSP1NEX7S09VyruL7_JJeZHW6b3RM-78A1HUNPZ8t_tDprKfXmHfb5Ork-HJyWmRhhCJgObYsAnq3BK44OM6dUo12iORah2ADSgilCxyBBWtBcqY8WhpKj2laOVd5rSCIHbLWzTv4SKgrAyBmUq1uGolYxmgZBSVlULUTQcCI8Ecf2ZBZw6N4xV-bqgdmbO9YGx1rs2NH5Ovqon89acbzzY-i81dNI-N1OoFxYHMc2JfiYES249AN-hNYf5d4893HsbT59VxYblhU_jVMf3qNvj-Tt9Ge_svMLllb3t7BHlkP98vZ4nY_RSYep_-P99P-wgfb1uRn |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dT9swFL1CDAl42PgUBcb8wCMpjj-SZm-lGiqsrabRId4s27lBFShFtPD7ZzumqjQNibcoshXHJ849_rjnAJwaLXMXyUzCtKCJENYkBjFLODoyIkou85ALczvIR6PO3V3xKyarh1wYRAyHz7DtL8Nefjm1L36p7NzntKXcJ1R9kkIw2qRrLZZUvIdEIfOoLZTS4rzb67nXaHuL8DbnIuPe1nsp_gSZ_uir8s_POESYyy8fbNsWfI5UknQb7LdhBesd2FwSGNyF62E4K4kkyqjeE8dRSX9x5iu5mo7JTbSw-066pNkqILouye_J7IEMJ40Gx7Tegz-XP8a9fhLdExLr5mzzxDoIUmSSoWZMS1lm2tG9SjtGginaVFvm2Aet0HWkNK5nbGpcLJda5yaTaPk-rNbTGg-A6NSiI1ayyspSOMJTZMK7TgorO5pbji1gb32qbJQW9w4XjypMMWihGiCUB0JFIFpwtqj01ChrvF_8woO1KOplscMNh4KKo0xpb69lOTO0osJkZUd0SltZhqxA48hSC_Y8ckvPa0BrwfEb9iqO4ZliBfX2wAXNDv9T7Rus98fDgRpcjX4ewYZvbrM6cwyr8-cX_Apr9nU-mT2fhA_1L8Nx4o0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Machine+Learning+for+Healthcare-IoT+Security%3A+A+Review+and+Risk+Mitigation&rft.jtitle=IEEE+access&rft.au=Khatun%2C+Mirza+Akhi&rft.au=Memon%2C+Sanober+Farheen&rft.au=Eising%2C+Ciar%C3%A1n&rft.au=Dhirani%2C+Lubna+Luxmi&rft.date=2023&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=11&rft.spage=145869&rft.epage=145896&rft_id=info:doi/10.1109%2FACCESS.2023.3346320&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2023_3346320 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |