2023
DOI: 10.1016/j.ijleo.2022.170315
|View full text |Cite
|
Sign up to set email alerts
|

Effective cyber security system to secure optical data based on deep learning approach for healthcare application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Additionally, they extracted the most significant characteristics from NSL-KDD data set by employing binary-based particle swarm optimization. Data gain as well as principal component analysis method for detecting network intrusion was presented in work [19]. MLP, instance-based learning, and SVM classifiers were used to evaluate their method's performance, and it produced superior results.…”
Section: Cloud Environment Based Security Analysis Existing Techniquesmentioning
confidence: 99%
“…Additionally, they extracted the most significant characteristics from NSL-KDD data set by employing binary-based particle swarm optimization. Data gain as well as principal component analysis method for detecting network intrusion was presented in work [19]. MLP, instance-based learning, and SVM classifiers were used to evaluate their method's performance, and it produced superior results.…”
Section: Cloud Environment Based Security Analysis Existing Techniquesmentioning
confidence: 99%
“…An ever-increasing volume of data is being generated by IoT devices equipped with all kinds of sensors, including those embedded in smart medical devices, monitoring systems for industrial equipment, and environmental sensors for agricultural fields [ 1 , 2 ]. This deluge of data necessitates a streamlined exchange across multiple organizations, as more and more IoT applications become global in scope.…”
Section: Introductionmentioning
confidence: 99%
“…Establishing data retention and purge strategies: when data is no longer needed, it should be securely deleted or purged to protect the privacy of the data [7][8][9].…”
mentioning
confidence: 99%