Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 22(21)2022 Nov 04.
Artigo em Inglês | MEDLINE | ID: mdl-36366214

RESUMO

Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services. Researchers and developers are, to date, considering the majority of the technological aspects and critical issues around the IoMT, e.g., security vulnerabilities and other cybercrimes. One of such major challenges IoMT has to face is widespread ransomware attacks; a malicious malware that encrypts the patients' critical data, restricts access to IoMT devices or entirely disable IoMT devices, or uses several combinations to compromise the overall system functionality, mainly for ransom. These ransomware attacks would have several devastating consequences, such as loss of life-threatening data and system functionality, ceasing emergency and life-saving services, wastage of several vital resources etc. This paper presents a ransomware analysis and identification architecture with the objective to detect and validate the ransomware attacks and to evaluate its accuracy using a comprehensive verification process. We first develop a comprehensive experimental environment, to simulate a real-time IoMT network, for experimenting various types of ransomware attacks. Following, we construct a comprehensive set of ransomware attacks and analyze their effects over an IoMT network devices. Furthermore, we develop an effective detection filter for detecting various ransomware attacks (e.g., static and dynamic attacks) and evaluate the degree of damages caused to the IoMT network devices. In addition, we develop a defense system to block the ransomware attacks and notify the backend control system. To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. The evaluation results show more than 95% of accuracy of detecting various ransomware attacks.


Assuntos
Serviços Médicos de Emergência , Internet das Coisas , Humanos , Atenção à Saúde , Internet
2.
Comput Intell Neurosci ; 2022: 2532580, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36248930

RESUMO

There are two main ways to achieve an active lifestyle, the first is to make an effort to exercise and second is to have the activity as part of your daily routine. The study's major purpose is to examine the influence of various kinds of physical engagements on density dispersion of participants in Shanghai, China, and even prototype check-in data from a Location-Based Social Network (LBSN) utilizing a mix of spatial, temporal, and visualization methodologies. This paper evaluates Weibo used for big data evaluation and its dependability in some types rather than physically collected proofs by investigating the relationship between time, class, place, frequency, and place of check-in built on geographic features and related consequences. Kernel density estimation has been used for geographical assessment. Physical activities and frequency allocation are formed as a result of hour-to-day consumption habits. Our observations are based on customer check-in activities in physical venues such as gyms, parks, and playing fields, the prevalence of check-ins, peak times for visiting fun parks, and gender disparities, and we applied relative difference formulation to reveal the gender difference in a much better way. The purpose of this research is to investigate the influence of physical activity and health-related standard of living on well-being in a selection of Shanghai inhabitants.


Assuntos
Ciência de Dados , Atenção à Saúde , Big Data , China , Geografia , Humanos
3.
Sensors (Basel) ; 22(18)2022 Sep 13.
Artigo em Inglês | MEDLINE | ID: mdl-36146282

RESUMO

Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting prospects and substantial challenges, especially in terms of security. Due to its distributed network and frequently changing topology, it is extremely prone to security attacks. The researchers have proposed different strategies for detecting various forms of network attacks. However, VANET is still exposed to several attacks, specifically Sybil attack. Sybil Attack is one of the most challenging attacks in VANETS, which forge false identities in the network to undermine communication between network nodes. This attack highly impacts transportation safety services and may create traffic congestion. In this regard, a novel collaborative framework based on majority voting is proposed to detect the Sybil attack in the network. The framework works by ensembling individual classifiers, i.e., K-Nearest Neighbor, Naïve Bayes, Decision Tree, SVM, and Logistic Regression in a parallel manner. The Majority Voting (Hard and Soft) mechanism is adopted for a final prediction. A comparison is made between Majority Voting Hard and soft to choose the best approach. With the proposed approach, 95% accuracy is achieved. The proposed framework is also evaluated using the Receiver operating characteristics curve (ROC-curve).


Assuntos
Redes de Comunicação de Computadores , Práticas Interdisciplinares , Teorema de Bayes , Análise por Conglomerados
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA