Parashar, Gaurav Chaudhary, Alka Rana, Ajay
Published in
SN Computer Science
This study attempts to categorise research conducted in the area of: use of machine learning in healthcare, using a systematic mapping study methodology. In our attempt, we reviewed literature from top journals, articles, and conference papers by using the keywords use of machine learning in healthcare. We queried Google Scholar, resulted in 1400 p...
Stübs, Marius Köster, Kevin
Published in
Energy Informatics
OpenDISCO is an open-source framework for decentralized simulation and security assessment of distributed power grid control. By incorporating security assessment directly into the control algorithms’ implementation process, the proposed framework aims to enable the rapid development of new control strategies. It provides a modular structure, enabl...
Yoo, Hyun Kim, Joo-Chang Kim, Keon-Woo Park, Roy C.
Published in
Journal of Computer Virology and Hacking Techniques
Current IT market has increased significantly boosted by the development of network technology and IT technology. As we move into an aging society, global people have paid attentions to the matters related to health while the many technologies related to health have been developed, too. Such a change of social paradigm has improved the quality of l...
Vithanwattana, Nattaruedee Mapp, Glenford George, Carlisle
Published in
Journal of Reliable Intelligent Environments
It has been clearly shown that mHealth solutions, which is the use of mobile devices and other wireless technology to provide healthcare services, deliver more patient-focused healthcare, and improve the overall efficiency of healthcare systems. In addition, these solutions can potentially reduce the cost of providing healthcare in the context of t...
Yoo, SeongMin Kim, Jinsul Park, JaeHyung Nam, Jiseung Ryou, JaeCheol
Published in
Cluster Computing
In the environment like the Cloud computing or the picture archiving and communications systems (PACS) of the hospital, the user’s data is stored in the storage of a third party. In such entrusted management environment, security is an important issue for the user’s private data. The most basic solution is to encrypt user’s private data. However, i...
Bernal Bernabe, Jorge Hernandez Ramos, Jose Luis Skarmeta Gomez, Antonio F.
Published in
Soft Computing
Internet of Things environments are comprised of heterogeneous devices that are continuously exchanging information and being accessed ubiquitously through lossy networks. This drives the need of a flexible, lightweight and adaptive access control mechanism to cope with the pervasive nature of such global ecosystem, ensuring, at the same time, reli...
Radhakrishnan, Sakthi Vignesh
The primary objective of the proposed research is to develop a framework for smart and robust fingerprinting of networked systems. Many fingerprinting techniques have been proposed in the past, however most of these techniques are designed for a specific purpose, such as Operating System (OS) fingerprinting, Access Point (AP) fingerprinting, etc. S...
Chuah, Chai Dawson, Ed Gonzalez Nieto, Juan Simpson, Leonie
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of f...
Cionca, Victor Newe, Thomas Dădârlat, Vasile Teodor
Published in
Journal of Network and Systems Management
Wireless Sensor Networks (WSNs) will benefit from security frameworks that provide easy to use security while hiding inherent complexity. In comparison to traditional networks, the hardware constraints of wireless sensors demand that network security be configured based on application parameters, in order to provide the desired level of security wh...