Vijayakumar KP, Pradeep K, Balasundaram A, Prusty MR. Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network. Processes. 2023;11(4):4. https://doi.org/10.3390/pr11041072.
Mamdouh M, Awad AI, Khalaf AAM, Hamed HFA. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. Comput Secur. 2021;111:102491. https://doi.org/10.1016/j.cose.2021.102491.
Huang Z. Analysis of IoT-based smart home applications. In: 2021 IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE). 2021, pp 218–221. https://doi.org/10.1109/CSAIEE54046.2021.9543308.
Ma L, Li Z, Zheng M. A research on IoT based smart home. In: 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Qiqihar, China: IEEE. 2019, pp 120–122. https://doi.org/10.1109/ICMTMA.2019.00033.
Cook DJ, Crandall AS, Thomas BL, Krishnan NC. CASAS: a smart home in a box. Computer 2013;46(7). https://doi.org/10.1109/MC.2012.328.
Tabaa M, Monteiro F, Bensag H, Dandache A. Green Industrial Internet of Things from a smart industry perspectives. Energy Rep. 2020;6:430–46. https://doi.org/10.1016/j.egyr.2020.09.022.
Brincat AA, Pacifici F, Martinaglia S, Mazzola F. The Internet of Things for intelligent transportation systems in real smart cities scenarios. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). 2019, pp 128–132. https://doi.org/10.1109/WF-IoT.2019.8767247.
Atiq HU, Ahmad Z, uz Zaman SK, Khan MA, Shaikh AA, Al-Rasheed A. Reliable resource allocation and management for IoT transportation using fog computing. Electronics 2023;12(6):6. https://doi.org/10.3390/electronics12061452.
Smart Healthcare - an overview | ScienceDirect Topics. [Online]. Available: https://www.sciencedirect.com/topics/engineering/smart-healthcare. Accessed 11 Jun 2024.
Saba Raoof S, Durai MAS. A Comprehensive Review on Smart Health Care: Applications, Paradigms, and Challenges with Case Studies. Contrast Media Mol Imaging. 2022;2022:4822235. https://doi.org/10.1155/2022/4822235.
Centenaro M, Costa CE, Granelli F, Sacchi C, Vangelista L. A Survey on Technologies, Standards and Open Challenges in Satellite IoT. IEEE Commun SurveysTutorials. 2021;23(3):1693–720. https://doi.org/10.1109/COMST.2021.3078433.
ASRPM, Selvapandian AJV, AS. Design of an EEG-based transceiver with data decomposition for IoHT applications. In: 2021 fifth International Conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC), 2021, pp 258–262. https://doi.org/10.1109/I-SMAC52330.2021.9641040.
Ianculescu M, Alexandru A, Nicolau N-D, Neagu G, Bica O. IoHT and edge computing, warrants of optimal responsiveness of monitoring applications for seniors. A case study. In: 2019 22nd International Conference on Control Systems and Computer Science (CSCS), 2019, pp 655–661. https://doi.org/10.1109/CSCS.2019.00118.
Bansal M, Priya. Application layer protocols for Internet of Healthcare Things (IoHT). In: 2020 Fourth International Conference on Inventive Systems and Control (ICISC), 2020, pp 369–376. https://doi.org/10.1109/ICISC47916.2020.9171092.
Deb S, Islam R, RobaiatMou J, Islam T. Design and implementation of low cost ECG monitoring system for the patient using smart device. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2017, pp 774–778. https://doi.org/10.1109/ECACE.2017.7913007.
Li C, Hu X, Zhang L. The IoT-based heart disease monitoring system for pervasive healthcare service. Procedia Comput Sci. 2017;112:2328–34. https://doi.org/10.1016/j.procs.2017.08.265.
Vergara PM, de la Cal E, Villar JR, González VM, Sedano J. An IoT platform for epilepsy monitoring and supervising. J Sens. 2017;2017(1):6043069. https://doi.org/10.1155/2017/6043069.
Catarinucci L, et al. An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2015;2(6):515–26. https://doi.org/10.1109/JIOT.2015.2417684.
Yin Y, Zeng Y, Chen X, Fan Y. The internet of things in healthcare: an overview. J Ind Inf Integr. 2016;1:3–13. https://doi.org/10.1016/j.jii.2016.03.004.
Azizan A, Ahmed W, Razak AHA. Sensing health: a bibliometric analysis of wearable sensors in healthcare. Health Technol. 2024;14(1):15–34. https://doi.org/10.1007/s12553-023-00801-y.
Kaushik K, Singh K. Security and trust in IoT communications: role and impact. In: Choudhury S, Mishra R, Mishra RG, Kumar A (Eds), Intelligent Communication, Control and Devices, Singapore: Springer, 2020, pp 791–798. https://doi.org/10.1007/978-981-13-8618-3_81.
Thamilarasu G, Odesile A, Hoang A. An Intrusion Detection System for Internet of Medical Things. IEEE Access. 2020;8:181560–76. https://doi.org/10.1109/ACCESS.2020.3026260.
What You Need To Know About Medical IoT Security. Capterra. [Online]. Available: https://www.capterra.com/resources/medical-internet-of-things-iot-security/. Accessed 12 Jun 2024.
Nations U. Population. United Nations. [Online]. Available: https://www.un.org/en/global-issues/population. Accessed 12 Jun 2024.
Chataut R, Phoummalayvane A, Akl R. Unleashing the power of IoT: a comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors (Basel). 2023;23(16):7194. https://doi.org/10.3390/s23167194.
A Full Guide to Networks for IoT Healthcare Devices. [Online]. Available: https://intellisoft.io/iot-in-healthcare-key-trends-usages/. Accessed 12 Jun 2024.
Alam T. “A Reliable Communication framework and its use in internet of things (Iot),” May 01, 2018. Rochester: Social Science Research Network. [Online]. Available: https://papers.ssrn.com/abstract=3619450. Accessed 07 Apr 2025.
Healthcare IoT - Worldwide | Statista Market Forecast. Statista. [Online]. Available: https://www.statista.com/outlook/tmo/internet-of-things/healthcare-iot/worldwide. Accessed 12 Jun 2024.
Raghupathi W, Raghupathi V, Saharia A. Analyzing health data breaches: a visual analytics approach. AppliedMath. 2023;3(1):1. https://doi.org/10.3390/appliedmath3010011.
Cartwright AJ. The elephant in the room: cybersecurity in healthcare. J Clin Monit Comput. 2023;37(5):1123–32. https://doi.org/10.1007/s10877-023-01013-5.
Reddy J, Elsayed N, ElSayed Z, Ozer M. A Review on Data Breaches in Healthcare Security Systems. IJCA. 2023;184(45):1–7. https://doi.org/10.5120/ijca2023922333.
Cost of a data breach: Healthcare industry impacts. Security Intelligence. [Online]. Available: https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts. Accessed 12 Jun 2024.
Expression P. The Cost of Cyberattacks in Healthcare in 2023. Intraprise Health. [Online]. Available: https://intraprisehealth.com/the-cost-of-cyberattacks-in-healthcare/. Accessed 12 Jun 2024.
Wolf A. Biggest healthcare industry cyber attacks. Arctic Wolf. [Online]. Available: https://arcticwolf.com/resources/blog/top-healthcare-industry-cyberattacks/. Accessed 12 Jun 2024.
Chua JA. Cybersecurity in the healthcare industry. [Online]. Available: https://podiatrym.com/pdf/2021/7/Chua821web.pdf. Accessed 7 Apr 2025.
Djenna A, Eddine Saïdouni D. Cyber attacks classification in IoT-Based-Healthcare infrastructure.In: 2018 2nd Cyber Security in Networking Conference (CSNet), 2018, pp 1–4. https://doi.org/10.1109/CSNET.2018.8602974.
Magnusson J, Sloof J. A Literature survey on cyber attacks in healthcare. [Online]. Available: https://hex.cse.kau.se/~jonamagn102/DVAD03_Sloof_Magnusson.pdf. Accessed 7 Apr 2025.
Thyagarajan C, Suresh S, Sathish N, Suthir DS. A typical analysis and survey on healthcare cyber security. 2020;9(03). [Online]. Available: https://www.researchgate.net/publication/348369769_A_Typical_Analysis_And_Survey_On_Healthcare_Cyber_Security#fullTextFileContent. Accessed 07 Apr 2025.
Alanazi AT. Clinicians’ perspectives on healthcare cybersecurity and cyber threats. Cureus 15(10):e47026. https://doi.org/10.7759/cureus.47026.
Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the users’ perspective: A cross-sectional study. Int J Med Informatics. 2023;175:105066. https://doi.org/10.1016/j.ijmedinf.2023.105066.
Raiyn J. A survey of cyber attack detection strategies. Int J Secur Appl. 2014;8:247–56. https://doi.org/10.14257/ijsia.2014.8.1.23.
Patel M, Amritha PP, Sudheer VB, Sethumadhavan M. DDoS attack detection model using machine learning algorithm in next generation firewall. Procedia Comput Sci. 2024;233:175–83. https://doi.org/10.1016/j.procs.2024.03.207.
Nguyen LAT, To BL, Nguyen HK, Nguyen MH. Detecting phishing web sites: a heuristic URL-based approach. 2013 International Conference on Advanced Technologies for Communications (ATC 2013), 2013, pp 597–602. https://doi.org/10.1109/ATC.2013.6698185.
Abdelhamid N, Ayesh A, Thabtah F. Phishing detection based Associative Classification data mining. Expert Syst Appl. 2014;41(13):5948–59. https://doi.org/10.1016/j.eswa.2014.03.019.
Mvah F, Kengne Tchendji V, Tayou Djamegni C, Anwar AH, Tosh DK, Kamhoua C. Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. Comput Secur. 2024;139:103696. https://doi.org/10.1016/j.cose.2023.103696.
Kumar V, Sinha D. A robust intelligent zero-day cyber-attack detection technique. Complex Intell Syst. 2021;7(5):2211–34. https://doi.org/10.1007/s40747-021-00396-9.
Holm H. Signature based intrusion detection for zero-day attacks: (not) a closed chapter? In: Proceedings of the 2014 47th Hawaii International Conference on System Sciences, In: HICSS ’14. USA: IEEE Computer Society, 2014, pp. 4895–4904. https://doi.org/10.1109/HICSS.2014.600.
Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments. Bull Netw Comput Syst Softw. 2019;8(2):2.
Visoottiviseth V, Sakarin P, Thongwilai J, Choobanjong T. Signature-based and behavior-based attack detection with machine learning for Home IoT devices. In: 2020 IEEE REGION 10 CONFERENCE (TENCON), 2020, pp 829–834. https://doi.org/10.1109/TENCON50793.2020.9293811.
Kwon H-Y, Kim T, Lee M-K. Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods. Electronics. 2022;11(6):6. https://doi.org/10.3390/electronics11060867.
Alsamiri J, Alsubhi K. Internet of Things cyber attacks detection using machine learning. IJACSA. 2019;10(12). https://doi.org/10.14569/IJACSA.2019.0101280.
Mtukushe N, Onaolapo AK, Aluko A, Dorrell DG. Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems. Energies. 2023;16(13):13. https://doi.org/10.3390/en16135206.
Apruzzese G et al. The role of machine learning in cybersecurity. Digit Threats.2023;4(1):8:1–8:38. https://doi.org/10.1145/3545574.
Shombot ES, Dusserre G, Bestak R, Ahmed NB. An application for predicting phishing attacks: A case of implementing a support vector machine learning model. Cyber Secur Appl. 2024;2:100036. https://doi.org/10.1016/j.csa.2024.100036.
Bahassi H, Edddermoug N, Mansour A, Mohamed A. Toward an exhaustive review on Machine Learning for Cybersecurity. Procedia Comput Sci. 2022;203:583–7. https://doi.org/10.1016/j.procs.2022.07.083.
Liu L, Wang B, Yu B, Zhong Q. Automatic malware classification and new malware detection using machine learning. Front Inf Technol Electronic Eng. 2017;18(9):1336–47. https://doi.org/10.1631/FITEE.1601325.
Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):33. https://doi.org/10.1007/s10922-023-09722-7.
Comments (0)