共 47 条
[1]
Walker-Roberts S., Hammoudeh M., Dehghantanha A., A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access, 6, pp. 25167-25177, (2018)
[2]
Abrar H., Et al., Risk analysis of cloud sourcing in healthcare and public health industry, IEEE Access, 6, pp. 19140-19150, (2018)
[3]
Yang Y., Et al., MedShare: a novel hybrid cloud for medical resource sharing among autonomous healthcare providers, IEEE Access, 6, pp. 46949-46961, (2018)
[4]
Hnamte V., Hussain J., An efficient DDoS attack detection mechanism in SDN environment, Int J Inf Technol, 15, pp. 2623-2636, (2023)
[5]
Ray S., Mishra K.N., Dutta S., Big data security issues from the perspective of IoT and cloud computing: a review, Recent Adv Comput Sci Commun Benthem Sci J, 13, pp. 1-25, (2020)
[6]
Kamal K.K., Gupta S., Joshi P., Et al., An efficient mCK signing and mobile based identity solution for authentication, Int J Inf Technol, 15, pp. 1637-1646, (2023)
[7]
Yuan Y., Wang F.Y., Parallel blockchain: concept, methods, and issues, Acta Autom Sin, 43, 10, pp. 1703-1712, (2017)
[8]
Ray S., Mishra K.N., Dutta S., Susceptible data classification and security re-assurance in cloud-IoT based computing environment, Sadhana J Eng Sci, 46, pp. 1-24, (2021)
[9]
Mawgoud A.A., Karadawy A.I., Tawfik B.S., A Secure Authentication Technique in the Internet of Medical Things through Machine Learning, pp. 1-25, (2020)
[10]
Chaudhary R.R.K., Chatterjee K.A., Lightweight security framework for electronic healthcare system, Int J Inf Technol, 14, pp. 3109-3121, (2022)