Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cybe...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 11; pp. 145869 - 145896
Main Authors: Khatun, Mirza Akhi, Memon, Sanober Farheen, Eising, Ciaran, Dhirani, Lubna Luxmi
Format: Journal Article
Language:English
Published: Piscataway IEEE 2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:2169-3536, 2169-3536
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR). A robust authentication mechanism based on machine learning and deep learning techniques is required to protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper, security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored and reported.
AbstractList The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR). A robust authentication mechanism based on machine learning and deep learning techniques is required to protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper, security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored and reported.
Author Dhirani, Lubna Luxmi
Khatun, Mirza Akhi
Memon, Sanober Farheen
Eising, Ciaran
Author_xml – sequence: 1
  givenname: Mirza Akhi
  orcidid: 0009-0008-4718-187X
  surname: Khatun
  fullname: Khatun, Mirza Akhi
  email: Mirza.Akhi@ul.ie
  organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland
– sequence: 2
  givenname: Sanober Farheen
  orcidid: 0000-0001-9382-7354
  surname: Memon
  fullname: Memon, Sanober Farheen
  organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland
– sequence: 3
  givenname: Ciaran
  orcidid: 0000-0001-8383-2635
  surname: Eising
  fullname: Eising, Ciaran
  organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland
– sequence: 4
  givenname: Lubna Luxmi
  orcidid: 0000-0001-7654-4117
  surname: Dhirani
  fullname: Dhirani, Lubna Luxmi
  organization: Department Electronic and Computer Engineering, University of Limerick, Limerick, Ireland
BookMark eNp9kU1rGzEQhkVJIWnqX5AeBD2vo4-V1urNmDRxcCjE6VnMamdtue4q1coN_veRvQ6EHjqHmWGY52WG9xM560KHhFxxNuacmevpbHazXI4FE3IsZamlYB_IheDaFFJJffauPyejvt-wHJM8UtUFuX8At_Yd0gVC7Hy3om2I9A5hm9YOIhbz8ESX6HbRp_03OqWP-NfjC4WuoY--_0UffPIrSD50n8nHFrY9jk71kvz8fvM0uysWP27ns-micCUzqXBMa45CCQQhQKlGA-OyBWkMcnQcnNBqwlosBVN1fsbxWgmuAKpaK3TykswH3SbAxj5H_xvi3gbw9jgIcWUhJu-2aEEbxp0UNWtZWetmUk4a1zqBwmDNqjJrfR20nmP4s8M-2U3YxS6fb4VhlSpz1nnLDFsuhr6P2Frn0_HnFMFvLWf24IQdnLAHJ-zJiczKf9i3i_9PfRkoj4jvCFlxmfMr5NiUiA
CODEN IAECCG
CitedBy_id crossref_primary_10_1016_j_csi_2025_104053
crossref_primary_10_1007_s10462_024_11101_w
crossref_primary_10_1016_j_procs_2025_03_302
crossref_primary_10_1186_s13638_025_02497_2
crossref_primary_10_3390_s25092779
crossref_primary_10_3390_computers14070250
crossref_primary_10_3390_s25185653
crossref_primary_10_1016_j_iot_2024_101068
crossref_primary_10_1016_j_iot_2024_101420
crossref_primary_10_1109_ACCESS_2025_3531659
crossref_primary_10_56294_hl2024_177
crossref_primary_10_1038_s41598_024_66392_4
crossref_primary_10_4108_eetpht_11_6170
crossref_primary_10_1159_000542288
Cites_doi 10.1007/978-3-030-51070-1_8
10.3390/s22197304
10.3390/s22041448
10.1007/978-3-031-16344-9_12
10.31185/wjcm.48
10.1007/s13198-015-0376-0
10.3390/s22093400
10.1007/s11277-021-09107-6
10.1109/COMST.2020.2973314
10.1109/ICACCAF.2017.8344724
10.1109/ICCSPA49915.2021.9385711
10.1002/widm.1485
10.1007/978-981-99-3668-7_5
10.1109/ACCESS.2020.3045115
10.1155/2022/6510934
10.1186/s40537-023-00704-9
10.1007/978-3-319-58280-1_10
10.1109/ICICCS48265.2020.9120906
10.1007/s42979-020-00205-z
10.1109/ICITST.2015.7412116
10.4018/978-1-7998-2454-1.ch071
10.1016/j.asoc.2023.110227
10.1016/j.enbuild.2023.112797
10.1109/COMST.2020.2988293
10.1007/s10586-023-04042-6
10.1201/9781003336624-4
10.1016/j.iot.2021.100393
10.1109/EIT.2018.8500144
10.1109/DCOSS52077.2021.00068
10.1016/j.jemep.2017.02.007
10.1109/IRASET52964.2022.9738218
10.23919/IConAC.2019.8895034
10.1109/ACCESS.2022.3216617
10.1109/ACCESS.2020.3026939
10.3390/s23083876
10.1109/TNSE.2023.3273301
10.1145/3558519
10.1016/j.iot.2021.100485
10.23919/cje.2022.00.282
10.1007/s13369-021-05985-x
10.1007/s40745-022-00444-2
10.1007/s10796-020-10056-x
10.1007/s11277-020-07546-1
10.1109/ICISC47916.2020.9171092
10.1016/j.ins.2022.10.060
10.3390/s21196346
10.1016/j.ijmedinf.2020.104087
10.1109/ACCESS.2023.3310242
10.3390/su141811403
10.1007/s42979-021-00592-x
10.1016/j.dsx.2020.04.012
10.3390/app13063828
10.5815/ijcnis.2020.04.02
10.1007/978-3-030-22868-2_90
10.1109/ICSSES58299.2023.10201156
10.1109/ICCES51350.2021.9489041
10.1109/JSAC.2020.3020654
10.1109/TVLSI.2021.3139904
10.1016/j.comcom.2020.12.003
10.1016/j.csa.2023.100016
10.1109/ACCESS.2020.3026260
10.3390/sym12071191
10.1109/ACCESS.2020.3000421
10.1109/jiot.2023.3283353
10.3390/s23084117
10.32604/csse.2023.039984
10.3390/s21113901
10.1109/ACCESS.2022.3205351
10.54808/WMSCI2022.01.6
10.1155/2019/4592902
10.1109/MSEC.2019.2902347
10.1002/int.23048
10.1016/j.iot.2019.100059
10.1016/j.comnet.2019.03.006
10.1007/s41635-017-0029-7
10.3390/brainsci13040683
10.1109/JIOT.2017.2749883
10.1007/978-981-15-8297-4_54
10.1109/COMST.2020.3036778
10.14569/IJACSA.2020.0110480
10.1109/MNET.001.1900105
10.4108/eetss.v8i30.590
10.1109/DCOSS.2019.00091
10.1007/s11036-022-01937-3
10.1109/SEGE.2019.8859950
10.1007/s40860-019-00079-w
10.1049/trit.2020.0073
10.1007/978-3-030-01560-2_5
10.1002/spy2.49
10.1109/COMST.2018.2874978
10.4018/978-1-6684-6413-7.ch008
10.12928/telkomnika.v18i4.15768
10.2147/JMDH.S419923
10.3390/s22062112
10.3390/s23031151
10.1016/B978-0-12-821472-5.00011-9
10.1109/ICSensT.2018.8603570
10.1109/TITS.2020.3028669
10.3390/app122211752
10.29304/jqcm.2023.15.3.1268
10.1109/COMST.2014.2320099
10.1109/MCC.2016.63
10.1109/AINA.2016.158
10.1109/WINCOM47513.2019.8942524
10.1109/LANMAN58293.2023.10189812
10.11591/ijece.v10i6.pp6461-6471
10.1109/INFOCOMWKSHPS54753.2022.9798301
10.1049/cit2.12078
10.1145/3411498.3419968
10.1016/j.future.2023.09.031
10.1109/ICCSA.2019.000-8
10.1109/TCSS.2022.3198123
10.1002/9781119795667.ch13
10.1016/j.micpro.2022.104622
10.1109/CSCWD.2017.8066704
10.1109/MCOM.2017.1600374CM
10.1109/SP.2009.33
10.1109/JIOT.2017.2778185
10.1109/AICAI.2019.8701238
10.1109/JPROC.2017.2761740
10.1109/SoutheastCon42311.2019.9020632
10.1201/9781003337218-11
10.1109/ICECA.2018.8474918
10.1007/s00521-022-06953-8
10.1109/ICCAIS48893.2020.9096818
10.1109/MIC.2021.3051675
10.1109/WCNC55385.2023.10118865
10.3390/electronics12061344
10.1016/j.nanoen.2023.108984
10.14569/IJACSA.2023.0140665
10.1109/WF-IoT.2016.7845455
10.5815/ijieeb.2020.05.03
10.1016/j.eswa.2023.120772
10.1007/978-3-030-05366-6_31
10.1016/j.health.2023.100177
10.1016/j.technovation.2022.102583
10.3390/app13031394
10.1002/ett.3935
10.1089/big.2022.0028
10.1145/3167486.3167554
10.1007/978-3-030-90083-0_7
10.3390/s20092649
10.1002/dac.4179
10.1007/978-3-031-45162-1_4
10.1145/3265639.3265652
10.1109/JIOT.2021.3062630
10.1016/j.measen.2022.100517
10.1109/BigData.2017.8258359
10.2991/ijcis.2018.25905181
10.1155/2021/5574376
10.1155/2014/357430
10.1109/ACCESS.2020.3004814
10.1016/j.ssaho.2020.100096
10.1007/978-981-99-0109-8
10.1007/s11277-020-07251-z
10.1007/978-981-15-4112-4_2
10.1109/ACCESS.2020.2984925
10.1002/9781119893998.ch13
10.1007/s10586-023-04069-9
10.1016/j.compeleceng.2022.108158
10.1007/978-3-031-40564-8_14
10.1002/9781118445112.stat06720.pub2
10.1016/j.compeleceng.2023.108626
10.1155/2020/8836927
10.1109/ACCESS.2022.3163580
10.3390/jcp2030027
10.37868/sei.v1i1.36
10.1007/978-3-031-29056-5_48
10.48161/qaj.v1n2a49
10.1109/IC3I56241.2022.10072727
10.1109/ACCESS.2021.3074125
10.1109/JIOT.2018.2878658
10.1016/j.compeleceng.2022.107691
10.1016/j.prime.2023.100158
10.1109/CBI.2017.27
10.1109/MCOM.2018.1700685
10.1109/ACCESS.2020.3020310
10.1201/9781003256243-6
10.1108/INTR-08-2019-0361
10.1145/3327961.3329530
10.1016/j.autcon.2019.01.023
10.1109/ISC2.2018.8656914
10.3390/en12193775
10.1109/ICCIT48885.2019.9038563
10.1016/j.jnca.2021.103179
10.3390/electronics12092050
10.12720/jcm.17.11.900-918
10.19101/IJACR.2019.940088
10.1007/s10877-023-01013-5
10.3390/fi9040093
10.1016/j.eswa.2021.116434
10.1155/2022/1863838
10.1109/JIOT.2022.3175669
10.1088/1742-6596/2007/1/012058
10.1109/ICIT52682.2021.9491114
10.1109/RBME.2020.3013489
10.1109/JSAC.2020.3020600
10.1109/JIOT.2019.2948149
10.1016/j.jpdc.2020.09.006
10.1016/j.comcom.2020.05.048
10.1109/INTECH.2016.7845081
10.1007/s12652-021-03302-w
10.1016/j.patcog.2017.10.030
10.3390/s22051959
10.1007/s41870-022-00869-1
10.3390/app12031353
10.5772/intechopen.110752
10.1109/ISNCC.2018.8530920
10.1109/COMST.2016.2582841
10.1016/j.maturitas.2018.04.008
10.3390/s22186765
10.1109/ACCESS.2021.3059858
10.1109/IWCMC58020.2023.10182654
10.1016/j.jksuci.2022.11.007
10.1007/978-3-030-24302-9_30
10.1016/j.imu.2023.101199
10.1186/s13635-020-00111-0
10.1016/j.ijleo.2022.170044
10.1007/s11831-022-09733-8
10.1109/IICCIT55816.2022.10010441
10.1016/j.jpdc.2022.01.030
10.4018/IJRQEH.289175
10.4018/978-1-7998-1253-1.ch003
10.3390/healthcare10112293
10.1109/GCWOT57803.2023.10064657
10.1007/s11227-018-2331-8
10.37868/sei.v3i1.124
10.3390/info8030077
10.1109/MNET.2019.1800083
10.1109/ICICOS.2017.8276353
10.3390/s17010130
10.1007/s40745-020-00253-5
10.54489/ijcim.v3i1.235
10.1007/978-981-16-3802-2_21
10.1016/j.jnca.2021.103164
10.3390/s23187843
10.1016/j.iot.2021.100420
10.1007/978-981-99-6353-9_8
10.1109/MCOM.001.2100035
10.1109/ICICICT46008.2019.8993264
10.1186/s13638-023-02261-4
10.3390/electronics12173541
10.1145/3241056
10.1201/9781003248750-2
10.1109/ACCESS.2022.3204051
10.1016/j.gltp.2022.03.030
10.1007/s10209-018-0618-4
10.1007/978-3-030-96040-7_10
10.1002/ett.4770
10.1109/CAIS.2019.8769560
10.2139/ssrn.4454407
10.1109/ICPS55917.2022.00046
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2023.3346320
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 145896
ExternalDocumentID oai_doaj_org_article_a6901c32b0f04b6d848dcfc2e29eb074
10_1109_ACCESS_2023_3346320
10371310
Genre orig-research
GrantInformation_xml – fundername: Science Foundation Ireland (SFI)
  grantid: 18/CRT/6049
  funderid: 10.13039/501100001602
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c409t-c0661e252ea22a55d6a013fa399e1ec1ac26580fe4205b320c1b5215aa7b65ec3
IEDL.DBID DOA
ISICitedReferencesCount 19
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001132278500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2169-3536
IngestDate Fri Oct 03 12:50:34 EDT 2025
Sun Jun 29 16:41:46 EDT 2025
Sat Nov 29 06:25:20 EST 2025
Tue Nov 18 21:07:26 EST 2025
Wed Aug 27 02:36:23 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c409t-c0661e252ea22a55d6a013fa399e1ec1ac26580fe4205b320c1b5215aa7b65ec3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7654-4117
0009-0008-4718-187X
0000-0001-8383-2635
0000-0001-9382-7354
OpenAccessLink https://doaj.org/article/a6901c32b0f04b6d848dcfc2e29eb074
PQID 2907542906
PQPubID 4845423
PageCount 28
ParticipantIDs proquest_journals_2907542906
doaj_primary_oai_doaj_org_article_a6901c32b0f04b6d848dcfc2e29eb074
crossref_citationtrail_10_1109_ACCESS_2023_3346320
crossref_primary_10_1109_ACCESS_2023_3346320
ieee_primary_10371310
PublicationCentury 2000
PublicationDate 20230000
2023-00-00
20230101
2023-01-01
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – year: 2023
  text: 20230000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref207
ref56
ref208
ref205
ref206
ref53
ref203
(ref86) 2023
ref204
ref55
ref201
ref54
ref202
ref209
ref210
ref211
ref51
ref50
ref218
ref219
ref48
ref216
ref47
ref217
ref42
ref214
ref41
ref215
ref44
ref212
ref43
ref213
ref49
ref8
ref7
ref9
Bekkali (ref59) 2022; 21
ref4
ref3
ref6
ref100
ref221
ref101
ref222
ref40
ref220
ref35
ref34
ref37
ref36
ref31
ref30
ref33
ref32
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
Albalawi (ref58) 2022; 100
ref28
(ref103) 2022
ref27
ref29
DiMaggio (ref66) 2022
ref200
ref128
ref249
ref97
ref126
ref247
ref96
ref127
ref248
ref99
ref124
ref245
ref125
ref246
ref93
ref254
ref92
ref134
ref255
ref95
ref131
ref252
ref94
ref132
ref253
ref250
ref130
ref91
ref90
ref89
ref137
ref258
ref259
ref88
ref135
ref256
ref87
ref136
ref257
(ref85) 2023
(ref133) 2021
ref144
ref265
ref145
ref266
ref84
ref142
ref263
ref83
ref143
ref264
ref140
ref261
ref141
ref262
ref260
ref79
ref108
ref229
ref78
ref109
ref106
ref227
ref107
ref228
ref75
ref104
ref225
ref74
ref105
ref226
ref77
ref102
ref223
ref76
ref224
ref71
ref111
ref232
ref70
ref112
ref233
ref73
ref230
ref72
ref110
ref231
ref68
ref119
ref67
ref117
ref238
ref69
ref118
ref239
ref64
ref115
ref63
ref116
ref237
ref113
ref234
ref114
ref235
(ref11) 2023
ref60
ref243
ref123
ref244
ref62
ref120
ref241
ref61
ref121
ref242
Varadharajan (ref81) 2018
Rohith (ref236); 420
ref240
ref168
ref169
McKeon (ref176) 2023
ref170
ref177
ref178
ref173
ref174
ref171
ref172
ref179
ref180
ref181
ref189
ref186
Comfort (ref138) 2023
ref187
ref184
Datta (ref251) 2020
ref185
ref182
Phillips (ref175) 2023
ref183
Mattioli (ref46) 2023
ref148
ref269
ref149
ref146
ref267
ref147
ref268
ref155
ref276
ref156
ref277
ref153
ref274
ref154
ref275
ref151
ref272
ref152
ref273
ref270
Cvitić (ref65) 2015; 26
ref150
ref271
Raj (ref139) 2023
Ahuja (ref129) 2023; 38
ref159
ref157
ref278
ref158
ref279
ref280
ref166
ref167
ref164
ref165
ref162
ref163
ref160
ref161
ref13
ref12
ref14
ref10
ref17
ref16
ref19
ref18
Khatkar (ref188) 2023; 14
Sonar (ref98) 2014; 10
Hanson (ref15) 2022
(ref82) 2022
Kost (ref45) 2023
Jannat (ref122) 2023; 3
Wickramasinghe (ref5) 2019
Alkhathami (ref52) 2022; 100
ref2
ref1
ref191
ref192
ref190
ref199
ref197
ref198
ref195
ref196
ref193
ref194
(ref80) 2023
References_xml – ident: ref7
  doi: 10.1007/978-3-030-51070-1_8
– ident: ref22
  doi: 10.3390/s22197304
– ident: ref75
  doi: 10.3390/s22041448
– ident: ref140
  doi: 10.1007/978-3-031-16344-9_12
– ident: ref118
  doi: 10.31185/wjcm.48
– ident: ref141
  doi: 10.1007/s13198-015-0376-0
– ident: ref206
  doi: 10.3390/s22093400
– ident: ref109
  doi: 10.1007/s11277-021-09107-6
– ident: ref33
  doi: 10.1109/COMST.2020.2973314
– ident: ref53
  doi: 10.1109/ICACCAF.2017.8344724
– ident: ref29
  doi: 10.1109/ICCSPA49915.2021.9385711
– ident: ref20
  doi: 10.1002/widm.1485
– ident: ref54
  doi: 10.1007/978-981-99-3668-7_5
– ident: ref19
  doi: 10.1109/ACCESS.2020.3045115
– volume: 38
  start-page: 3033
  issue: 3
  year: 2023
  ident: ref129
  article-title: Improved heuristic framework for cyber security system on DDoS attack
  publication-title: J. Data Acquisition Process.
– ident: ref88
  doi: 10.1155/2022/6510934
– ident: ref163
  doi: 10.1186/s40537-023-00704-9
– ident: ref155
  doi: 10.1007/978-3-319-58280-1_10
– ident: ref164
  doi: 10.1109/ICICCS48265.2020.9120906
– ident: ref35
  doi: 10.1007/s42979-020-00205-z
– ident: ref56
  doi: 10.1109/ICITST.2015.7412116
– ident: ref221
  doi: 10.4018/978-1-7998-2454-1.ch071
– year: 2020
  ident: ref251
  article-title: A survey on activation functions and their relation with xavier and he normal initialization
  publication-title: arXiv:2004.06632
– ident: ref240
  doi: 10.1016/j.asoc.2023.110227
– ident: ref234
  doi: 10.1016/j.enbuild.2023.112797
– ident: ref177
  doi: 10.1109/COMST.2020.2988293
– ident: ref127
  doi: 10.1007/s10586-023-04042-6
– ident: ref207
  doi: 10.1201/9781003336624-4
– ident: ref228
  doi: 10.1016/j.iot.2021.100393
– volume: 420
  start-page: 283
  volume-title: Proc. 21st Int. Conf. Hybrid Intell. Syst. (HIS)
  ident: ref236
  article-title: Sentiment analysis of IMDb movie reviews: A comparative analysis of feature selection and feature extraction techniques
– ident: ref51
  doi: 10.1109/EIT.2018.8500144
– ident: ref30
  doi: 10.1109/DCOSS52077.2021.00068
– ident: ref202
  doi: 10.1016/j.jemep.2017.02.007
– ident: ref216
  doi: 10.1109/IRASET52964.2022.9738218
– ident: ref67
  doi: 10.23919/IConAC.2019.8895034
– ident: ref225
  doi: 10.1109/ACCESS.2022.3216617
– ident: ref70
  doi: 10.1109/ACCESS.2020.3026939
– ident: ref169
  doi: 10.3390/s23083876
– ident: ref256
  doi: 10.1109/TNSE.2023.3273301
– ident: ref272
  doi: 10.1145/3558519
– ident: ref152
  doi: 10.1016/j.iot.2021.100485
– volume-title: Edge to Core and the Internet of Things and Data Placement
  year: 2023
  ident: ref11
– ident: ref92
  doi: 10.23919/cje.2022.00.282
– ident: ref214
  doi: 10.1007/s13369-021-05985-x
– ident: ref227
  doi: 10.1007/s40745-022-00444-2
– ident: ref229
  doi: 10.1007/s10796-020-10056-x
– ident: ref104
  doi: 10.1007/s11277-020-07546-1
– ident: ref203
  doi: 10.1109/ICISC47916.2020.9171092
– ident: ref260
  doi: 10.1016/j.ins.2022.10.060
– volume: 21
  start-page: 25
  year: 2022
  ident: ref59
  article-title: Systematic literature review of Internet of Things (IoT) security
  publication-title: Adv. Indynamical Syst. Appl.
– ident: ref217
  doi: 10.3390/s21196346
– ident: ref180
  doi: 10.1016/j.ijmedinf.2020.104087
– ident: ref110
  doi: 10.1109/ACCESS.2023.3310242
– ident: ref237
  doi: 10.3390/su141811403
– ident: ref223
  doi: 10.1007/s42979-021-00592-x
– ident: ref182
  doi: 10.1016/j.dsx.2020.04.012
– ident: ref277
  doi: 10.3390/app13063828
– ident: ref201
  doi: 10.5815/ijcnis.2020.04.02
– ident: ref145
  doi: 10.1007/978-3-030-22868-2_90
– ident: ref43
  doi: 10.1109/ICSSES58299.2023.10201156
– ident: ref84
  doi: 10.1109/ICCES51350.2021.9489041
– ident: ref17
  doi: 10.1109/JSAC.2020.3020654
– ident: ref254
  doi: 10.1109/TVLSI.2021.3139904
– ident: ref243
  doi: 10.1016/j.comcom.2020.12.003
– ident: ref185
  doi: 10.1016/j.csa.2023.100016
– ident: ref242
  doi: 10.1109/ACCESS.2020.3026260
– ident: ref154
  doi: 10.3390/sym12071191
– ident: ref196
  doi: 10.1109/ACCESS.2020.3000421
– ident: ref170
  doi: 10.1109/jiot.2023.3283353
– ident: ref212
  doi: 10.3390/s23084117
– ident: ref241
  doi: 10.32604/csse.2023.039984
– ident: ref1
  doi: 10.3390/s21113901
– ident: ref125
  doi: 10.1109/ACCESS.2022.3205351
– ident: ref77
  doi: 10.54808/WMSCI2022.01.6
– ident: ref250
  doi: 10.1155/2019/4592902
– ident: ref232
  doi: 10.1109/MSEC.2019.2902347
– ident: ref128
  doi: 10.1002/int.23048
– ident: ref258
  doi: 10.1016/j.iot.2019.100059
– ident: ref41
  doi: 10.1016/j.comnet.2019.03.006
– volume-title: Cyber Resilience Act, Shaping Europe’s Digital Future, Legislative Proposal COM (2022) 713 Final
  year: 2022
  ident: ref82
– ident: ref68
  doi: 10.1007/s41635-017-0029-7
– ident: ref226
  doi: 10.3390/brainsci13040683
– ident: ref209
  doi: 10.1109/JIOT.2017.2749883
– ident: ref61
  doi: 10.1007/978-981-15-8297-4_54
– ident: ref224
  doi: 10.1109/COMST.2020.3036778
– ident: ref73
  doi: 10.14569/IJACSA.2020.0110480
– ident: ref239
  doi: 10.1109/MNET.001.1900105
– ident: ref134
  doi: 10.4108/eetss.v8i30.590
– ident: ref39
  doi: 10.1109/DCOSS.2019.00091
– ident: ref55
  doi: 10.1007/s11036-022-01937-3
– year: 2023
  ident: ref176
  article-title: Biggest healthcare data breaches reported this year, so far
– ident: ref264
  doi: 10.1109/SEGE.2019.8859950
– ident: ref166
  doi: 10.1007/s40860-019-00079-w
– ident: ref238
  doi: 10.1049/trit.2020.0073
– ident: ref153
  doi: 10.1007/978-3-030-01560-2_5
– ident: ref105
  doi: 10.1002/spy2.49
– ident: ref108
  doi: 10.1109/COMST.2018.2874978
– volume-title: Nursing Rights of Medication Administration
  year: 2022
  ident: ref15
– ident: ref268
  doi: 10.4018/978-1-6684-6413-7.ch008
– ident: ref208
  doi: 10.12928/telkomnika.v18i4.15768
– ident: ref279
  doi: 10.2147/JMDH.S419923
– ident: ref74
  doi: 10.3390/s22062112
– ident: ref137
  doi: 10.3390/s23031151
– ident: ref8
  doi: 10.1016/B978-0-12-821472-5.00011-9
– volume-title: The NIS 2 Directive
  year: 2022
  ident: ref103
– ident: ref162
  doi: 10.1109/ICSensT.2018.8603570
– ident: ref248
  doi: 10.1109/TITS.2020.3028669
– ident: ref149
  doi: 10.3390/app122211752
– ident: ref280
  doi: 10.29304/jqcm.2023.15.3.1268
– ident: ref245
  doi: 10.1109/COMST.2014.2320099
– ident: ref49
  doi: 10.1109/MCC.2016.63
– ident: ref246
  doi: 10.1109/AINA.2016.158
– ident: ref89
  doi: 10.1109/WINCOM47513.2019.8942524
– ident: ref167
  doi: 10.1109/LANMAN58293.2023.10189812
– ident: ref266
  doi: 10.1109/COMST.2020.2973314
– ident: ref72
  doi: 10.11591/ijece.v10i6.pp6461-6471
– ident: ref99
  doi: 10.1109/INFOCOMWKSHPS54753.2022.9798301
– ident: ref113
  doi: 10.1049/cit2.12078
– ident: ref106
  doi: 10.1145/3411498.3419968
– ident: ref95
  doi: 10.1016/j.future.2023.09.031
– volume-title: Directive on Measures for a High Common Level of Cybersecurity Across the Union (NIS2 Directive)
  year: 2023
  ident: ref85
– ident: ref210
  doi: 10.1109/ICCSA.2019.000-8
– ident: ref231
  doi: 10.1109/TCSS.2022.3198123
– ident: ref230
  doi: 10.1002/9781119795667.ch13
– volume: 14
  start-page: 685
  issue: 1
  year: 2023
  ident: ref188
  article-title: Parametric influence of intrusion detection system in healthcare sector using deep neural [LSTM] network
  publication-title: J. Pharmaceutical Negative Results
– ident: ref197
  doi: 10.1016/j.micpro.2022.104622
– ident: ref147
  doi: 10.1109/CSCWD.2017.8066704
– ident: ref275
  doi: 10.1109/MCOM.2017.1600374CM
– year: 2023
  ident: ref175
  article-title: Healthcare cybersecurity in 2023: Hive’s shutdown is good news but cyberattacks are only getting worse
  publication-title: Insider Intell.
– ident: ref142
  doi: 10.1109/SP.2009.33
– ident: ref63
  doi: 10.1109/JIOT.2017.2778185
– ident: ref115
  doi: 10.1109/AICAI.2019.8701238
– ident: ref253
  doi: 10.1109/JPROC.2017.2761740
– ident: ref191
  doi: 10.1109/SoutheastCon42311.2019.9020632
– ident: ref267
  doi: 10.1201/9781003337218-11
– volume: 100
  start-page: 1
  issue: 15
  year: 2022
  ident: ref52
  article-title: Detection of SQL injection attacks using machine learning in cloud computing platform
  publication-title: J. Theor. Appl. Inf. Technol.
– ident: ref38
  doi: 10.1109/ICECA.2018.8474918
– ident: ref255
  doi: 10.1007/s00521-022-06953-8
– ident: ref100
  doi: 10.1109/ICCAIS48893.2020.9096818
– ident: ref14
  doi: 10.1109/MIC.2021.3051675
– ident: ref25
  doi: 10.1109/WCNC55385.2023.10118865
– ident: ref143
  doi: 10.3390/electronics12061344
– ident: ref23
  doi: 10.1016/j.nanoen.2023.108984
– volume: 100
  start-page: 2988
  year: 2022
  ident: ref58
  article-title: Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment
  publication-title: J. Theor. Appl. Inf. Technol
– ident: ref18
  doi: 10.14569/IJACSA.2023.0140665
– ident: ref168
  doi: 10.1109/WF-IoT.2016.7845455
– volume-title: The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime
  year: 2022
  ident: ref66
– ident: ref116
  doi: 10.5815/ijieeb.2020.05.03
– ident: ref194
  doi: 10.1016/j.eswa.2023.120772
– ident: ref259
  doi: 10.1007/978-3-030-05366-6_31
– ident: ref271
  doi: 10.1016/j.health.2023.100177
– ident: ref183
  doi: 10.1016/j.technovation.2022.102583
– ident: ref27
  doi: 10.3390/app13031394
– ident: ref111
  doi: 10.1002/ett.3935
– ident: ref262
  doi: 10.1089/big.2022.0028
– ident: ref78
  doi: 10.1145/3167486.3167554
– ident: ref159
  doi: 10.1007/978-3-030-90083-0_7
– ident: ref181
  doi: 10.3390/s20092649
– ident: ref13
  doi: 10.1002/dac.4179
– ident: ref83
  doi: 10.1007/978-3-031-45162-1_4
– ident: ref112
  doi: 10.1145/3265639.3265652
– ident: ref204
  doi: 10.1109/JIOT.2021.3062630
– ident: ref270
  doi: 10.1016/j.measen.2022.100517
– ident: ref247
  doi: 10.1109/BigData.2017.8258359
– ident: ref48
  doi: 10.2991/ijcis.2018.25905181
– ident: ref9
  doi: 10.1155/2021/5574376
– ident: ref102
  doi: 10.1155/2014/357430
– ident: ref87
  doi: 10.1109/ACCESS.2020.3004814
– ident: ref165
  doi: 10.1016/j.ssaho.2020.100096
– ident: ref171
  doi: 10.1007/978-981-99-0109-8
– ident: ref123
  doi: 10.1007/s11277-020-07251-z
– ident: ref179
  doi: 10.1007/978-981-15-4112-4_2
– ident: ref36
  doi: 10.1109/ACCESS.2020.2984925
– ident: ref126
  doi: 10.1002/9781119893998.ch13
– ident: ref276
  doi: 10.1007/s10586-023-04069-9
– ident: ref195
  doi: 10.1016/j.compeleceng.2022.108158
– ident: ref93
  doi: 10.1007/978-3-031-40564-8_14
– ident: ref158
  doi: 10.1002/9781118445112.stat06720.pub2
– ident: ref187
  doi: 10.1016/j.compeleceng.2023.108626
– ident: ref21
  doi: 10.1155/2020/8836927
– ident: ref60
  doi: 10.1109/ACCESS.2022.3163580
– ident: ref218
  doi: 10.3390/jcp2030027
– ident: ref101
  doi: 10.37868/sei.v1i1.36
– ident: ref96
  doi: 10.1007/978-3-031-29056-5_48
– ident: ref50
  doi: 10.48161/qaj.v1n2a49
– ident: ref124
  doi: 10.1109/IC3I56241.2022.10072727
– ident: ref71
  doi: 10.1109/ACCESS.2021.3074125
– ident: ref26
  doi: 10.1109/JIOT.2018.2878658
– ident: ref40
  doi: 10.1016/j.compeleceng.2022.107691
– ident: ref47
  doi: 10.1016/j.prime.2023.100158
– ident: ref12
  doi: 10.1109/CBI.2017.27
– ident: ref130
  doi: 10.1109/MCOM.2018.1700685
– ident: ref69
  doi: 10.1109/ACCESS.2020.3020310
– ident: ref233
  doi: 10.1201/9781003256243-6
– volume: 3
  start-page: 1
  year: 2023
  ident: ref122
  article-title: Proposed on attack analysis using risk assessment and security risk assessment using attacks for cloud cyber security
  publication-title: Comput. Sci.
– ident: ref172
  doi: 10.1108/INTR-08-2019-0361
– ident: ref263
  doi: 10.1145/3327961.3329530
– ident: ref131
  doi: 10.1016/j.autcon.2019.01.023
– year: 2023
  ident: ref46
  article-title: ENISA foresight cybersecurity threats for 2030
– ident: ref178
  doi: 10.1109/ISC2.2018.8656914
– ident: ref44
  doi: 10.3390/en12193775
– ident: ref135
  doi: 10.1109/ICCIT48885.2019.9038563
– ident: ref42
  doi: 10.1016/j.jnca.2021.103179
– ident: ref186
  doi: 10.3390/electronics12092050
– ident: ref57
  doi: 10.12720/jcm.17.11.900-918
– ident: ref90
  doi: 10.19101/IJACR.2019.940088
– ident: ref184
  doi: 10.1007/s10877-023-01013-5
– ident: ref3
  doi: 10.3390/fi9040093
– ident: ref16
  doi: 10.1016/j.eswa.2021.116434
– ident: ref261
  doi: 10.1155/2022/1863838
– ident: ref278
  doi: 10.1109/JIOT.2022.3175669
– ident: ref121
  doi: 10.1088/1742-6596/2007/1/012058
– volume: 10
  start-page: 58
  issue: 11
  year: 2014
  ident: ref98
  article-title: A survey: DDoS attack on Internet of Things
  publication-title: Int. J. Eng. Res. Develop.
– ident: ref76
  doi: 10.1109/ICIT52682.2021.9491114
– ident: ref34
  doi: 10.1109/RBME.2020.3013489
– ident: ref6
  doi: 10.1109/JSAC.2020.3020600
– ident: ref107
  doi: 10.1109/JIOT.2019.2948149
– ident: ref119
  doi: 10.1016/j.jpdc.2020.09.006
– ident: ref200
  doi: 10.1016/j.comcom.2020.05.048
– ident: ref132
  doi: 10.1109/INTECH.2016.7845081
– ident: ref273
  doi: 10.1007/s12652-021-03302-w
– ident: ref252
  doi: 10.1016/j.patcog.2017.10.030
– ident: ref120
  doi: 10.3390/s22051959
– ident: ref198
  doi: 10.1007/s41870-022-00869-1
– ident: ref146
  doi: 10.3390/app12031353
– year: 2018
  ident: ref81
  article-title: Study of security attacks against IoT infrastructures
– ident: ref269
  doi: 10.5772/intechopen.110752
– ident: ref274
  doi: 10.1109/ISNCC.2018.8530920
– ident: ref64
  doi: 10.1109/COMST.2016.2582841
– ident: ref192
  doi: 10.1016/j.maturitas.2018.04.008
– ident: ref211
  doi: 10.3390/s22186765
– ident: ref31
  doi: 10.1109/ACCESS.2021.3059858
– ident: ref189
  doi: 10.1109/IWCMC58020.2023.10182654
– ident: ref193
  doi: 10.1016/j.jksuci.2022.11.007
– ident: ref148
  doi: 10.1007/978-3-030-24302-9_30
– ident: ref161
  doi: 10.1016/j.imu.2023.101199
– volume-title: As Biohacking Evolves, How Vulnerable are we to Cyber Threats?
  year: 2023
  ident: ref80
– year: 2023
  ident: ref138
  article-title: German banking regulator BaFin’s website hit by cyber attack
– ident: ref173
  doi: 10.1186/s13635-020-00111-0
– ident: ref199
  doi: 10.1016/j.ijleo.2022.170044
– ident: ref28
  doi: 10.1007/s11831-022-09733-8
– ident: ref249
  doi: 10.1109/IICCIT55816.2022.10010441
– volume: 26
  start-page: 1
  issue: 1
  year: 2015
  ident: ref65
  article-title: Classification of security risks in the IoT environment
  publication-title: Ann. DAAAM
– ident: ref114
  doi: 10.1016/j.jpdc.2022.01.030
– ident: ref265
  doi: 10.4018/IJRQEH.289175
– ident: ref150
  doi: 10.4018/978-1-7998-1253-1.ch003
– ident: ref190
  doi: 10.3390/healthcare10112293
– year: 2023
  ident: ref86
  article-title: Complete guide to GDPR compliance
– ident: ref2
  doi: 10.1109/GCWOT57803.2023.10064657
– ident: ref24
  doi: 10.1007/s11227-018-2331-8
– volume-title: Delivering Superior Health and Wellness Management With IoT and Analytics
  year: 2019
  ident: ref5
– ident: ref62
  doi: 10.37868/sei.v3i1.124
– ident: ref205
  doi: 10.3390/info8030077
– ident: ref244
  doi: 10.1109/MNET.2019.1800083
– ident: ref220
  doi: 10.1109/ICICOS.2017.8276353
– ident: ref4
  doi: 10.3390/s17010130
– ident: ref222
  doi: 10.1007/s40745-020-00253-5
– volume-title: 14 Biggest Healthcare Data Breaches [Updated 2023]
  year: 2023
  ident: ref45
– ident: ref160
  doi: 10.54489/ijcim.v3i1.235
– ident: ref235
  doi: 10.1007/978-981-16-3802-2_21
– ident: ref32
  doi: 10.1016/j.jnca.2021.103164
– ident: ref91
  doi: 10.3390/s23187843
– ident: ref174
  doi: 10.1016/j.iot.2021.100420
– ident: ref219
  doi: 10.1007/978-981-99-6353-9_8
– year: 2023
  ident: ref139
  article-title: Critical infrastructure cyberattack on Japan’s biggest port
– ident: ref156
  doi: 10.1109/MCOM.001.2100035
– ident: ref117
  doi: 10.1109/ICICICT46008.2019.8993264
– ident: ref213
  doi: 10.1186/s13638-023-02261-4
– ident: ref257
  doi: 10.3390/electronics12173541
– ident: ref157
  doi: 10.1145/3241056
– ident: ref10
  doi: 10.1201/9781003248750-2
– ident: ref144
  doi: 10.1109/ACCESS.2022.3204051
– ident: ref151
  doi: 10.1016/j.gltp.2022.03.030
– ident: ref37
  doi: 10.1007/s10209-018-0618-4
– ident: ref97
  doi: 10.1007/978-3-030-96040-7_10
– year: 2021
  ident: ref133
  article-title: Conti cyber attack on the HSE
– ident: ref94
  doi: 10.1002/ett.4770
– ident: ref79
  doi: 10.1109/CAIS.2019.8769560
– ident: ref215
  doi: 10.2139/ssrn.4454407
– ident: ref136
  doi: 10.1109/ICPS55917.2022.00046
SSID ssj0000816957
Score 2.4514341
Snippet The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 145869
SubjectTerms 5G mobile communication
5G NR
5G-IoT
Anomalies
anomaly detection
attacks
Blood pressure
Command and control
Cybersecurity
Data integrity
Deep learning
generative AI
Generative artificial intelligence
Health care
Healthcare-IoT
Internet of medical things
Internet of Things
Machine learning
Medical services
mitigation techniques
Monitoring
Narrowband
Privacy
Risk
Security
security and privacy challenges
Sensors
Temperature sensors
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA06fNAHv8XplDz4aGebNm3j2xzKFCfiB_gWbtNUhtKJm_5-703jGIiCb6U0NM1pck8-7jmMHeHAKCOjIAAko0ESmyqAIoWggqrAaIOUAJxk_nV2c5M_Palbn6zucmGste7wme3SpdvLL8fmg5bKTiinLYopoWoxy9ImWWu2oEIOEkpmXlkoCtVJr9_Hj-iSQXg3jpM0JlPvuejjRPq9q8qPodjFl4u1f9Zsna16Isl7DfIbbMHWm2xlTl5wi10N3UlJy72I6jNHhsoHsxNfweX4gd97A7tT3uPNRgGHuuR3o8kLH44aBY5xvc0eL84f-oPAeycEBmds08AglYiskMKCECBlmQKSvQqQj9jImgiMQO4RVjYRoSywZUxUYCSXAFmRSmviHdaqx7XdZVzicK4qcheSyAVUmUNE2ay509UBMG0mvttUGy8sTv4Wr9pNMEKlGyA0AaE9EG12PCv01uhq_P34GYE1e5REsd0NREH7PqaBzLVMLIqwCpMiLfMkL01lhBXKFkiV2mybkJt7XwNam3W-sde-B0-0UCGZA6sw3ful2D5bpio26zEd1pq-f9gDtmQ-p6PJ-6H7Ob8AZYffMQ
  priority: 102
  providerName: IEEE
Title Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
URI https://ieeexplore.ieee.org/document/10371310
https://www.proquest.com/docview/2907542906
https://doaj.org/article/a6901c32b0f04b6d848dcfc2e29eb074
Volume 11
WOSCitedRecordID wos001132278500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA4iHvQg_sTplBw8WpekTdd4m0NRcSI6wVt4TVMZSifb9Ojf7kuajYKgFy89lLRpXl7f-16bfB8hxxgYJTcKIkAwGiWxKSPIU4hKKHPMNggJwFPm33bv7rLnZ3XfkPpya8JqeuDacB1wikkmFjkrWZKnRZZkhSmNsELZHPOfi76sqxrFlI_BGU-V7AaaIc5Up9fv44hOnVr4aRwnaewUvhupyDP2B4mVH3HZJ5vLDbIeUCLt1U-3SZZstUXWGtyB2-Rm4JdBWhoYUl8owk96tVjOFV2Ph_QxqNOd0R6t_wJQqAr6MJq-0sGoptcYVzvk6fJi2L-KgjBCZLAcm0UGcQK3QgoLQoCURQqI5EpAsGG5NRyMQGDBSpsIJnMcqeE5pmkJ0M1TaU28S5arcWX3CJUYq1XppIMkJnpVZMDdVtXMk-YAmBYRcxtpE1jDnXjFm_bVA1O6Nqx2htXBsC1ysrjovSbN-L35uTP-oqljvPYn0A908AP9lx-0yI6bukZ_MdbfHG_ens-lDq_nVAvFnPKvYun-f_R9QFbdeOovM22yPJt82EOyYj5no-nkyHsmHgdfF0d-f-E3NAvkUg
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Nj9MwEB2hBQn2sHwt2u4W8IEj6SZOnMbcSkXVQlshKNLerInjoGpXKerH_n5mHLeqhEDiFkWx4vjFnuePeQ_gHQ2MKrEaIyQyGmWprSMsc4xqrEuKNkQJ0EvmT_vzeXFzo7-GZHWfC-Oc84fPXI8v_V5-tbI7Xiq75py2JOWEqocqy2TcpmsdllTYQ0KrftAWSmJ9PRgO6TN6bBHeS9MsT9nW-yj-eJn-4Kvyx2DsI8zo6X_W7RmcBSopBi32z-GBa17A6ZHA4Ev4PPNnJZ0IMqo_BXFUMT6c-Yomq4X4HizsPoiBaLcKBDaV-Lbc3IrZstXgWDXn8GP0aTEcR8E9IbI0Z9tGlshE4qSSDqVEpaocie7VSIzEJc4maCWxj7h21JCqpJaxSUmxXCH2y1w5m76Ck2bVuAsQigZ0XbO_kCI2oKsCE85nLbyyDqLtgNy3qbFBWpwdLu6Mn2LE2rRAGAbCBCA68P5Q6FerrPHvxz8yWIdHWRbb3yAUTOhlBtley6ayjOs4K_OqyIrK1lY6qV1JZKkD54zc0fta0DrQ3WNvQh_eGKljtgfWcX75l2Jv4fF4MZua6WT-5QqecHXb1ZkunGzXO_caHtn77XKzfuN_1N8qeOJ4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Machine+Learning+for+Healthcare-IoT+Security%3A+A+Review+and+Risk+Mitigation&rft.jtitle=IEEE+access&rft.au=Khatun%2C+Mirza+Akhi&rft.au=Memon%2C+Sanober+Farheen&rft.au=Eising%2C+Ciaran&rft.au=Dhirani%2C+Lubna+Luxmi&rft.date=2023&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=11&rft.spage=145869&rft.epage=145896&rft_id=info:doi/10.1109%2FACCESS.2023.3346320&rft.externalDocID=10371310
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon