• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4627407)   Today's Articles (1066)   Subscriber (49591)
For: Akshay Kumaar M, Samiayya D, Vincent PMDR, Srinivasan K, Chang CY, Ganesh H. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning. Front Public Health 2022;9:824898. [PMID: 35096763 PMCID: PMC8790147 DOI: 10.3389/fpubh.2021.824898] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/29/2021] [Accepted: 12/16/2021] [Indexed: 12/01/2022]  Open
Number Cited by Other Article(s)
1
Ibrahim M, Al-Wadi A, Elhafiz R. Security Analysis for Smart Healthcare Systems. SENSORS (BASEL, SWITZERLAND) 2024;24:3375. [PMID: 38894166 PMCID: PMC11175093 DOI: 10.3390/s24113375] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/03/2024] [Revised: 05/18/2024] [Accepted: 05/21/2024] [Indexed: 06/21/2024]
2
Messinis S, Temenos N, Protonotarios NE, Rallis I, Kalogeras D, Doulamis N. Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review. Comput Biol Med 2024;170:108036. [PMID: 38295478 DOI: 10.1016/j.compbiomed.2024.108036] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/14/2023] [Revised: 01/08/2024] [Accepted: 01/26/2024] [Indexed: 02/02/2024]
3
Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybern Biomed Eng 2022. [DOI: 10.1016/j.bbe.2022.11.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
4
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. SENSORS 2022;22:s22062194. [PMID: 35336373 PMCID: PMC8952217 DOI: 10.3390/s22062194] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2022] [Revised: 03/06/2022] [Accepted: 03/09/2022] [Indexed: 01/27/2023]
5
Gupta C, Johri I, Srinivasan K, Hu YC, Qaisar SM, Huang KY. A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks. SENSORS 2022;22:s22052017. [PMID: 35271163 PMCID: PMC8915055 DOI: 10.3390/s22052017] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/05/2022] [Revised: 02/28/2022] [Accepted: 02/28/2022] [Indexed: 02/04/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA