2023
DOI: 10.1016/j.jksuci.2022.11.007
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 43 publications
1
11
0
Order By: Relevance
“…The orthogonal tables utilized a smaller amount of trials to discover the optimal combination for every factor with various levels. The ) value is derived as shown in equation (22), and the best combination is determined using just 8 tests.…”
Section: Orthogonal Opposition-based Learning (Oobl) Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The orthogonal tables utilized a smaller amount of trials to discover the optimal combination for every factor with various levels. The ) value is derived as shown in equation (22), and the best combination is determined using just 8 tests.…”
Section: Orthogonal Opposition-based Learning (Oobl) Approachmentioning
confidence: 99%
“…Wagan et al 22 proposed the duo‐secure IoMT framework using multimodal data signal that shows the variation of different attack patterns and data from conventional healthcare devices, while Nandy et al 23 proposed an empirical intelligent agent (EIA) based on a Swarm‐neural network (Swarm‐NN) algorithm to prevent privacy leakage in IoMT networks. Fang et al 24 developed an anomaly detection system for detecting illegal behavior (DIB) in a medical IoT environment using rough set theory and fuzzy core vector machine by rough set theory with fuzzy core vector machine (R‐FCVM).…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Feature selection techniques play an important role in improving the performance of intrusion detection systems (IDS) in the Internet of Medical Things (IoMT) [ 25 , 35 ]. There are various feature selection algorithms that have been used in the literature to reduce the dimensionality of the input features while preserving their relevant information [ 36 ]. Filter-based methods, such as chi-square and information gain, evaluate each feature individually to determine its contribution to the target variable [ 30 ].…”
Section: Related Workmentioning
confidence: 99%
“…The use of deep learning algorithms for anomaly-based intrusion detection systems (IDS) in the Internet of Medical Things (IoMT) has gained significant attention in recent years [ 35 ]. Anomaly-based IDS aim to detect security incidents by identifying deviations from normal behavior in the network or devices [ 36 ]. Deep learning algorithms can be used to model this normal behavior and detect anomalies in real time.…”
Section: Introductionmentioning
confidence: 99%
“…However, with the increasing connectivity of medical devices and systems, concerns have also grown in areas where it is difficult to have proper infrastructure. This is where unmanned aerial vehicles (UAVs) use in the context of secure communication systems in IoMT emerges as a promising solution [3]. UAVs, commonly known as drones, have proven helpful in various fields, and their potential applications in the healthcare industry are vast owing to their compatibility [4].…”
Section: Introductionmentioning
confidence: 99%