-
301
Blockchain based medical image encryption using Arnold’s cat map in a cloud environment
Published 2024-03-01“…Storing or sending medical data through public clouds exposes information into potential eavesdropping, data breaches and unauthorized access. Encrypting data before transmission is crucial to mitigate these security risks. …”
Get full text
Article -
302
Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems
Published 2019-01-01“…Without proactive monitoring of audit records, data breaches may go undetected. In addition, external threats, such as phishing or social engineering techniques to acquire a clinician's logon credentials, need to be identified. …”
Get full text
Article -
303
Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information.
Published 2022-01-01“…Opportunities for data breaches may also arise when working with non-study staff who are not on-site. …”
Get full text
Article -
304
Phishing email detection using machine learning
Published 2021“…This can lead to identity theft, data breaches and financial losses for the victims. As such, it is important for individuals and organisations, particularly the government sector, to safeguard against such threats in a timely manner. …”
Get full text
Final Year Project (FYP) -
305
Privacy based classification model of public data by utilizing two-steps validation approach
Published 2023“…It is further critical when this public data is already exposed to data breaches and data theft. In this work, we propose a data privacy classification approach for public data where this data resides on digital platforms. …”
Article -
306
Ensemble synthesized minority oversampling-based generative adversarial networks and random forest algorithm for credit card fraud detection.
Published 2023“…Most credit card frauds are conducted online by illegally obtaining payment credentials through data breaches, phishing, or scamming. Many solutions have been suggested to address the credit card fraud problem for online transactions. …”
Get full text
Article -
307
Survey of Public Attitudes toward the Secondary Use of Public Healthcare Data in Korea
Published 2023-10-01“…Concerns were frequently noted regarding commercial use of data and data breaches. Among the respondents, 50.9% were negative about the use of public healthcare data by private insurance companies, 22.9% favored this use, and 1.9% were “very positive.” …”
Get full text
Article -
308
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
Published 2020-01-01“…Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. …”
Get full text
Article -
309
Data Vaults for Blockchain-Empowered Accounting Information Systems
Published 2021-01-01“…The suggested cost-effective framework can be easily integrated into AIS and ERP systems to identify data breaches.…”
Get full text
Article -
310
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks
Published 2024-01-01“…The reported increasing rate of data breaches through vehicular networks by Distributed Denial of Service (DDoS) type of intrusion creates concern for such networks. …”
Get full text
Article -
311
Ensemble Synthesized Minority Oversampling-Based Generative Adversarial Networks and Random Forest Algorithm for Credit Card Fraud Detection
Published 2023-01-01“…Most credit card frauds are conducted online by illegally obtaining payment credentials through data breaches, phishing, or scamming. Many solutions have been suggested to address the credit card fraud problem for online transactions. …”
Get full text
Article -
312
Billiard based optimization with deep learning driven anomaly detection in internet of things assisted sustainable smart cities
Published 2023-11-01“…An anomaly detection system helps to identify possible data breaches or cyber-attacks by identifying abnormal data patterns. …”
Get full text
Article -
313
Network security framework for Internet of medical things applications: A survey
Published 2024-04-01“…Therefore, network security is critical in IoMT applications due to data breaches, vulnerabilities, and distributed denial of service attacks on medical data. …”
Get full text
Article -
314
State of the Art in Adoption of Contact Tracing Apps and Recommendations Regarding Privacy Protection and Public Health: Systematic Review
Published 2021-06-01“…The least often implemented criteria were provisions of information about personal data breaches and data gathered from children. The balance between standards of data protection and public health benefits was achieved best by the COVIDSafe app and worst by the Alipay Health Code app. …”
Get full text
Article -
315
P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks
Published 2012-07-01“…In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health information custodians. Automated PHI detection tools that crawl the P2P networks can identify PHI and alert custodians. …”
Get full text
Article -
316
A review of Blockchain Technology applications for financial services
Published 2022-07-01“…Credit reports significantly impact the financial lives of customers. Recent data breaches demonstrate the superior security of blockchain-based credit reporting over conventional server-based reporting. …”
Get full text
Article -
317
Deep learning approach to security enforcement in cloud workflow orchestration
Published 2023-01-01“…Such threats include data breaches, data loss, denial of service, service rejection, and malicious insiders generated from issues such as multi-tenancy, loss of control over data and trust. …”
Get full text
Article -
318
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…However, because of frequently reported health data breaches, many people may hesitate to use telehealth-based health care services. …”
Get full text
Article -
319
A Framework of the Critical Factors for Healthcare Providers to Share Data Securely Using Blockchain
Published 2022-01-01“…Poor security, which increases data breaches, endangers patients both mentally, socially, and financially. …”
Get full text
Article -
320