2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicati 2017
DOI: 10.1109/idaacs.2017.8095207
|View full text |Cite
|
Sign up to set email alerts
|

Modelling of healthcare IoT using the queueing theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 1 publication
0
16
0
Order By: Relevance
“…• Internet of things (IOT) attacks: The second area is the IOT attacks. More and more nontraditional devices are connected to the internet, which means devices that do not have the highest levels of security may become integrated into hospital networks [194][195][196].…”
Section: Information and Cyber Health Securitymentioning
confidence: 99%
“…• Internet of things (IOT) attacks: The second area is the IOT attacks. More and more nontraditional devices are connected to the internet, which means devices that do not have the highest levels of security may become integrated into hospital networks [194][195][196].…”
Section: Information and Cyber Health Securitymentioning
confidence: 99%
“…The most cited papers about technological aspects of cyber security concern security and privacy issues connected with: wireless body area networks [13], the framework for m-Health security [14], and the security architecture designed for providing authentication and authorization services in webbased distributed systems [15]. Moreover, aspects such as security of IoT devices [16] or new cryptographic schemes, e.g. [17], designed for healthcare systems are a common subject.…”
Section: Healthcare Data Securitymentioning
confidence: 99%
“…Such devices can sense the electrical, chemical, and thermal signals from the patient's body. As a result, these devices can directly sense and gather patient information through biomedical signals [20]. The process of signal transmission makes it relatively simple for data to be disrupted and stolen.…”
Section: Vulnerabilities Of Cybersecurity In Medical Domainmentioning
confidence: 99%