Alalhareth et al., 2023 - Google Patents
An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical ThingsAlalhareth et al., 2023
View HTML- Document ID
- 14614756996639407265
- Author
- Alalhareth M
- Hong S
- Publication year
- Publication venue
- Sensors
External Links
Snippet
In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This integration poses a risk from cybersecurity threats that can harm patient data and well-being …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Song et al. | Analysis of autoencoders for network intrusion detection | |
Aldhaheri et al. | DeepDCA: novel network-based detection of IoT attacks using artificial immune system | |
Alghazzawi et al. | Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection | |
Chaganti et al. | A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things | |
Sudqi Khater et al. | A lightweight perceptron-based intrusion detection system for fog computing | |
Thapa et al. | Comparison of machine learning and deep learning models for network intrusion detection systems | |
Zheng et al. | An improved LDA-based ELM classification for intrusion detection algorithm in IoT application | |
Fotiadou et al. | Network traffic anomaly detection via deep learning | |
Alalhareth et al. | An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things | |
Musafer et al. | An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems | |
Alabsi et al. | CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks | |
Alsulami et al. | An intrusion detection and classification system for IoT traffic with improved data engineering | |
Rao et al. | An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset | |
Palla et al. | Intelligent Mirai malware detection for IoT nodes | |
Shah et al. | Network intrusion detection through discriminative feature selection by using sparse logistic regression | |
Al-Qudah et al. | Effective one-class classifier model for memory dump malware detection | |
Talaei Khoei et al. | A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems | |
Alkahtani et al. | Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems | |
Verma et al. | A novel intrusion detection approach using machine learning ensemble for IoT environments | |
Yaser et al. | Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder | |
Sarwar et al. | Enhanced anomaly detection system for iot based on improved dynamic SBPSO | |
Lee et al. | Cybersecurity threats based on machine learning-based offensive technique for password authentication | |
Cheng et al. | Cyber situation comprehension for IoT systems based on APT alerts and logs correlation | |
Al-Taleb et al. | Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments | |
Liu et al. | Real-time anomaly detection of network traffic based on CNN |