4.6 Article

Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Things

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT

Fazlullah Khan et al.

Summary: The Internet of Medical Things (IoMT) effectively addresses various issues in conventional healthcare systems such as personnel shortages, care quality, insufficient supplies, and expenses. IoMT technology offers advantages in treatment efficiency and quality, but faces increasing cyberattacks. This article proposes a cyberattack detection method using ensemble learning and fog-cloud architecture to ensure security. The method outperforms baseline approaches in terms of precision by 4% according to evaluation on the ToN-IoT dataset.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Biomedical

Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization

Ilhan Firat Kilincer et al.

Summary: The widespread use of interconnected healthcare equipment and networks in the Internet of Medical Things (IoMT) increases the risk of security compromise. This study presents a cyber-attack and anomaly detection model based on recursive feature elimination (RFE) and multilayer perceptron (MLP). The model achieved high accuracy rates when tested on various IoMT cybersecurity datasets, demonstrating its effectiveness in countering cyber attacks in healthcare applications.

BIOCYBERNETICS AND BIOMEDICAL ENGINEERING (2023)

Article Public, Environmental & Occupational Health

Toward explainable AI-empowered cognitive health assessment

Abdul Rehman Javed et al.

Summary: Explainable artificial intelligence (XAI) plays a crucial role in various domains, such as healthcare, fitness, skill assessment, and personal assistants, by providing an understanding and explanation of AI decision-making process. This study introduces XAI-HAR, a novel XAI-enabled human activity recognition (HAR) approach, which utilizes key features extracted from sensor data collected in a smart home. XAI-HAR utilizes feature selection techniques including physical key features selection (PKFS) and statistical key features selection (SKFS) with a weighted criteria to ensure accurate activity recognition.

FRONTIERS IN PUBLIC HEALTH (2023)

Article Computer Science, Information Systems

COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach

Chandramohan Dhasarathan et al.

Summary: This article discusses the analysis and prediction of COVID-19 data from patient data repository and highlights the risks to users' credentials and personal information. It proposes a homomorphic identification method to minimize the risk factors and emphasizes the importance of individual user privacy preservation.

COMPUTER COMMUNICATIONS (2023)

Article Medical Informatics

Real time health care big data analytics model for improved QoS in cardiac disease prediction with IoT devices

M. Safa et al.

Summary: This article analyzes the issues of big data analytics and health care support systems. It presents an efficient Health Care Big Data Analytics Model (HCBDA) that can monitor patients' bio signals to predict diseases. By transferring data and using machine learning models for classification and clustering analysis, the accuracy of disease prediction can be improved.

HEALTH AND TECHNOLOGY (2023)

Article Computer Science, Cybernetics

Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System

Zhuotao Lian et al.

Summary: With the development of smart mobile devices, the Internet of Medical Things (IoMT) has a promising future. IoMT devices can detect patient signs, provide treatment guidance, and even instant diagnoses through technologies such as artificial intelligence (AI) and wireless communication. However, traditional centralized machine learning approaches face challenges in IoMT devices due to difficulties in large-scale data collection and potential privacy breaches. To address these issues, we propose a blockchain-based two-stage federated learning approach that enables IoMT devices to collaboratively train a global model without centralizing data in a server.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Telecommunications

An ensemble deep learning model for cyber threat hunting in industrial internet of things

Abbas Yazdinejad et al.

Summary: In this paper, an ensemble deep learning model is proposed to identify out-of-norm activities for cyber threat hunting in IIoT. The model combines LSTM and AE to learn normal data patterns and reduce data dimension. It also addresses the imbalanced nature of IIoT datasets by extracting new balanced data. Experimental results show that the proposed model outperforms conventional machine learning classifiers and other related models.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Artificial Intelligence

Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks

Firas Mohammed Aswad et al.

Summary: With the rapid growth of informatics systems' technology, the Internet of Things (IoT) has become more valuable and vital to everyday life. However, the insecure nature of IoT devices has led to difficulties, including DDoS attacks. This study proposes combining three deep learning algorithms to build a bidirectional CNN-BiLSTM DDoS detection model, which achieves the best accuracy and precision.

JOURNAL OF INTELLIGENT SYSTEMS (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Blockchain for Software Maintainability in Healthcare

Y. Gokul et al.

Summary: In the healthcare industry, software quality is crucial for medical intervention systems. Software maintainability, which makes up a significant portion of development costs, can be assessed using metrics stored in a central location. To address the issue of data tampering, we used a blockchain-based storage solution to secure and protect maintainability metrics and related data.

PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023 (2023)

Article Automation & Control Systems

Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System

Aqsa Mohiyuddin et al.

Summary: Medical Internet of Things (MIoT) plays a crucial role in enhancing people's health, protection, and treatment by remotely monitoring patients' health data and transferring it to medical data centers through cloud storage. However, the exponential growth in data handled by MIoT devices poses challenges in terms of data protection and privacy. Researchers have proposed a novel approach using ANFIS system to improve security and address confidentiality concerns.

INTERNATIONAL JOURNAL OF FUZZY SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection

Janmenjoy Nayak et al.

Summary: The Internet of Medical Things (IoMT) is revolutionizing the healthcare industry by integrating medical devices and sensors to improve personalized healthcare services. However, the widespread use of these devices raises concerns about security and data privacy.

JOURNAL OF SUPERCOMPUTING (2022)

Article Mathematical & Computational Biology

An Ensemble-Based Multiclass Classifier for Intrusion Detection Using Internet of Things

Deepti Rani et al.

Summary: Internet of Things (IoT) is a rapidly growing technology that connects billions of smart devices through the Internet, and it has applications in various domains such as healthcare and transportation. A secure network is essential for IoT, but with the increasing number of interconnected devices, cybersecurity issues are becoming more prevalent. This article demonstrates that external users can access IoT devices and infer user activity through network traffic analysis. The article also evaluates the performance of various machine learning algorithms in designing an efficient intrusion detection system (IDS) using telemetry datasets from different IoT scenarios.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2022)

Article Engineering, Multidisciplinary

A machine learning-based intrusion detection for detecting internet of things network attacks

Yakub Kayode Saheed et al.

Alexandria Engineering Journal (2022)

Article Computer Science, Information Systems

Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization

P. Kuppusamy et al.

Summary: This paper introduces a reinforced strategy Dynamic Opposition Learning based Social Spider Optimization (DOLSSO) algorithm to enhance workflow scheduling in fog computing. The proposed algorithm achieves better CPU utilization and less energy consumption compared to other techniques.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2022)

Article Computer Science, Information Systems

A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization

Sunil Gautam et al.

Summary: This study presents a hybrid model based on deep learning called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit for intrusion detection. Through simulations on a public dataset, the model demonstrates high performance in accurately predicting network attacks.

ELECTRONICS (2022)

Article Urban Studies

Future smart cities requirements, emerging technologies, applications, challenges, and future aspects

Abdul Rehman Javed et al.

Summary: Future smart cities are crucial for fulfilling increasing demands and better resource management through information and communication advancements. However, rapid population growth poses challenges in creating sustainable urban spaces. The rise of smart cities ensures citizen rights and well-being, along with evaluating urban planning from an environmental perspective. This paper surveys future technologies and requirements for smart cities, reviews existing application frameworks, discusses technological challenges, and identifies future dimensions for developing smart cities.

CITIES (2022)

Article Multidisciplinary Sciences

An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems

Ramzi A. Haraty et al.

Summary: The latest improvements in internet technology have led to its adoption in healthcare, but also increased the risk of database attacks. Proper assessment of damage scale and quick recovery through new models and lightweight structures are essential for efficient database restoration.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2022)

Article Computer Science, Artificial Intelligence

A hybrid Harris Hawks optimization algorithm with simulated annealing for feature selection

Mohamed Abdel-Basset et al.

Summary: The paper introduces a hybrid algorithm HHOBSA for solving the feature selection problem in classification tasks by combining bitwise operations and simulated annealing, showing superior results compared to other algorithms.

ARTIFICIAL INTELLIGENCE REVIEW (2021)

Article Computer Science, Information Systems

An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks

Prabhat Kumar et al.

Summary: Internet of Medical Things (IoMT), a branch of Internet of Things (IoT), provides unparalleled benefits in improving patient care quality and treatment efficiency. However, the increasing severity and frequency of cyber-attacks in IoMT environments pose significant challenges.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)

Soneila Khan et al.

Summary: The rapid development of Internet of Things (IoT), especially Internet of Medical Things (IoMT), has brought about large-scale data processing and potential network threats. The authors proposed a deep learning-driven software-defined network framework for efficient detection of malicious software in IoMT, and conducted a comprehensive evaluation.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game

Omar Abdel Wahab et al.

Summary: This research proposes a repeated Bayesian Stackelberg game to address multi-type attacks in cloud-based systems. Through risk assessment, live-migration-based defense mechanism, machine-learning technology, and resource-aware Bayesian Stackelberg game, the detection of attacks is maximized.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning

Sawsan AbdulRahman et al.

Summary: This article introduces FedMCCS, a multi-criteria client selection method for addressing the issue of limited client resources leading to decreased model accuracy in federated learning. FedMCCS outperforms other approaches in reducing communication rounds, maximizing the number of clients, handling the least number of discarded rounds, and optimizing network traffic.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Public, Environmental & Occupational Health

Machine Learning Assisted Cervical Cancer Detection

Mavra Mehmood et al.

Summary: Cervical cancer is the fourth most common cause of cancer death in women globally, associated with HPV infection. Early screening can prevent cervical cancer, but in developing countries, women lack access to screening programs, leading to high individual patient risk.

FRONTIERS IN PUBLIC HEALTH (2021)

Article Public, Environmental & Occupational Health

Trustworthy Intrusion Detection in E-Healthcare Systems

Faiza Akram et al.

Summary: This paper presents an approach for effective intrusion detection in the e-healthcare environment using ANFIS, addressing security challenges researchers face in maintaining patient health records in a safe IoT-net.

FRONTIERS IN PUBLIC HEALTH (2021)

Review Health Care Sciences & Services

IoT-Based Applications in Healthcare Devices

Bikash Pradhan et al.

Summary: Recent research has focused on the field of healthcare services and technological advancements, with a particular emphasis on the potential applications of Internet of Things (IoT) in remote medical services. This has led to improvements in patient safety, reduced healthcare costs, increased accessibility of medical services, and enhanced operational efficiency in the healthcare industry.

JOURNAL OF HEALTHCARE ENGINEERING (2021)

Article Computer Science, Information Systems

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond

Sawsan AbdulRahman et al.

Summary: Driven by privacy concerns and deep learning visions, a paradigm shift has occurred in the applicability mechanism of machine learning (ML) over the past four years. A new model called federated learning (FL) has emerged as a privacy-preserving decentralized approach that involves local ML training and eliminates data communication overhead. This article explores and compares various ML-based deployment architectures, with a focus on in-depth investigation of FL, providing a new classification of FL topics and research fields based on analysis of technical challenges and current work in the field.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

A robust multiobjective Harris' Hawks Optimization algorithm for the binary classification problem

Tansel Dokeroglu et al.

Summary: The Harris' Hawks Optimization (HHO) is a recent metaheuristic inspired by the cooperative behavior of hawks, which simulates their hunting patterns. A new multiobjective HHO algorithm is proposed in this study to address binary classification problems and reduce the number of selected features.

KNOWLEDGE-BASED SYSTEMS (2021)

Proceedings Paper Computer Science, Information Systems

Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks

Nadine Abbas et al.

Summary: This paper addresses the vulnerabilities of SDN and introduces attack-specific feature selection to identify the most influential features for anomaly detection. By utilizing data pre-processing and univariate feature selection, the authors are able to reduce computational costs while maintaining high performance in modeling. Detailed analysis and simulation results demonstrate the significant features and their impact on different attacks.

2021 3RD IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM) (2021)

Article Computer Science, Information Systems

Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms

Yakub Kayode Saheed et al.

Summary: Advancements in ICT have changed the computing paradigm, with IoT providing new communication channels in the medical field but also posing security challenges.

IEEE ACCESS (2021)

Proceedings Paper Telecommunications

A Self-Learning Approach for Detecting Intrusions in Healthcare Systems

Panagiotis Radoglou-Grammatikis et al.

Summary: This study introduces an Intrusion Detection and Prevention System (IDPS) to protect healthcare communications using HTTP and Modbus/TCP protocols, with a focus on dynamically retraining supervised classifiers using an active learning approach. The evaluation shows the system's efficiency against HTTP and Modbus/TCP cyberattacks, with increased overall accuracy in different retraining phases.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) (2021)

Article Computer Science, Hardware & Architecture

Deep Neural Network Feature Designs for RF Data-Driven Wireless Device Classification

Bechir Hamdaoui et al.

Summary: This article discusses the limitations of existing DNN feature design methods for wireless device classification and proposes novel approaches to improve robustness and accuracy. By customizing DNN models based on the unique structures of RF communication signals and spectrum emissions, the proposed feature designs substantially enhance classification performance. The strategies presented show great potential for further improving DNN-based wireless device classification and address open research challenges in the field.

IEEE NETWORK (2021)

Article Computer Science, Information Systems

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

Sanaa Kaddoura et al.

Summary: In the era of the Internet of things, companies have transitioned from paper-based data to electronic formats, with healthcare databases being a prime target for attackers. This paper introduces a novel approach inspired by COVID-19 infection behavior to assess database damage in healthcare systems efficiently. The proposed parallel algorithm significantly outperforms existing algorithms in terms of both time and memory, providing a minimized execution time.

FUTURE INTERNET (2021)

Article Computer Science, Information Systems

Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems

Omar Abdel Wahab et al.

Summary: The survey aims to address the shortcomings in existing federated learning literature by providing a detailed multi-level classification scheme to assist in designing future solutions based on challenges and techniques.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Review Computer Science, Information Systems

A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications

Hemantha Krishna Bharadwaj et al.

Summary: The Internet of Things is driving rapid automation in the healthcare sector, with a focus on data gathering, processing, and accurate predictions using machine learning algorithms. This paper serves as a compilation and review of state of the art applications of ML algorithms in Healthcare Internet of Things.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Cloud federation formation using genetic and evolutionary game theoretical models

Ahmad Hammoud et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture

Swarna R. M. Priya et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems

Nabil Moukafih et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning?

Sawsan Abdul Rahman et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

Anar A. Hady et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Active learning to detect DDoS attack using ranked features

Rup Kumar Deka et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

Harris hawks optimization: Algorithm and applications

Ali Asghar Heidari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Health Care Sciences & Services

Use of real-world evidence for healthcare decision-making in the Middle East: practical considerations and future directions

Kasem S. Akhras et al.

EXPERT REVIEW OF PHARMACOECONOMICS & OUTCOMES RESEARCH (2019)

Article Computer Science, Information Systems

Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud

Omar Abdel Wahab et al.

IEEE Transactions on Services Computing (2017)