Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Language
Publication year range
1.
Comput Biol Med ; 167: 107630, 2023 12.
Article in English | MEDLINE | ID: mdl-37952305

ABSTRACT

The Corona virus outbreak sped up the process of digitalizing healthcare. The ubiquity of IoT devices in healthcare has thrust the Healthcare Internet of Things (HIoT) to the forefront as a viable answer to the shortage of healthcare professionals. However, the medical field's ability to utilize this technology may be constrained by rules governing the sharing of data and privacy issues. Furthermore, endangering human life is what happens when a medical machine learning system is tricked or hacked. As a result, robust protections against cyberattacks are essential in the medical sector. This research uses two technologies, namely federated learning and blockchain, to solve these problems. The ultimate goal is to construct a trusted federated learning system on the blockchain that can predict people who are at risk for developing diabetes. The study's findings were deemed satisfactory as it achieved a multilayer perceptron accuracy of 97.11% and an average federated learning accuracy of 93.95%.


Subject(s)
Blockchain , Coronavirus Infections , Coronavirus , Education, Medical , Humans , Privacy
3.
Sci Rep ; 13(1): 18403, 2023 10 27.
Article in English | MEDLINE | ID: mdl-37891244

ABSTRACT

Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including Ponzi schemes, have witnessed rapid growth and emerged as major threats in societies like Nigeria, particularly due to the high poverty rate. Many individuals have fallen victim to these scams, resulting in significant financial losses. Despite efforts to detect Ponzi schemes using various methods, including machine learning (ML), current techniques still face challenges, such as deficient datasets, reliance on transaction records, and limited accuracy. To address the negative impact of Ponzi schemes, this paper proposes a novel approach focusing on detecting Ponzi schemes on Ethereum using ML algorithms like random forest (RF), neural network (NN), and K-nearest neighbor (KNN). Over 20,000 datasets related to Ethereum transaction networks were gathered from Kaggle and preprocessed for training the ML models. After evaluating and comparing the three models, RF demonstrated the best performance with an accuracy of 0.94, a class-score of 0.8833, and an overall-score of 0.96667. Comparative evaluations with previous models indicate that our model achieves high accuracy. Moreover, this innovative work successfully detects key fraud features within the Ponzi scheme dataset, reducing the number of features from 70 to only 10 while maintaining a high level of accuracy. The main strength of this proposed method lies in its ability to detect clever Ponzi schemes from their inception, offering valuable insights to combat these financial threats effectively.


Subject(s)
Algorithms , Machine Learning , Humans , Neural Networks, Computer , Random Forest , Fraud
4.
Sensors (Basel) ; 22(14)2022 Jul 19.
Article in English | MEDLINE | ID: mdl-35891056

ABSTRACT

In general, the adoption of IoT applications among end users in healthcare is very low. Healthcare professionals present major challenges to the successful implementation of IoT for providing healthcare services. Many studies have offered important insights into IoT adoption in healthcare. Nevertheless, there is still a need to thoroughly review the effective factors of IoT adoption in a systematic manner. The purpose of this study is to accumulate existing knowledge about the factors that influence medical professionals to adopt IoT applications in the healthcare sector. This study reviews, compiles, analyzes, and systematically synthesizes the relevant data. This review employs both automatic and manual search methods to collect relevant studies from 2015 to 2021. A systematic search of the articles was carried out on nine major scientific databases: Google Scholar, Science Direct, Emerald, Wiley, PubMed, Springer, MDPI, IEEE, and Scopus. A total of 22 articles were selected as per the inclusion criteria. The findings show that TAM, TPB, TRA, and UTAUT theories are the most widely used adoption theories in these studies. Furthermore, the main perceived adoption factors of IoT applications in healthcare at the individual level are: social influence, attitude, and personal inattentiveness. The IoT adoption factors at the technology level are perceived usefulness, perceived ease of use, performance expectancy, and effort expectations. In addition, the main factor at the security level is perceived privacy risk. Furthermore, at the health level, the main factors are perceived severity and perceived health risk, respectively. Moreover, financial cost, and facilitating conditions are considered as the main factors at the environmental level. Physicians, patients, and health workers were among the participants who were involved in the included publications. Various types of IoT applications in existing studies are as follows: a wearable device, monitoring devices, rehabilitation devices, telehealth, behavior modification, smart city, and smart home. Most of the studies about IoT adoption were conducted in France and Pakistan in the year 2020. This systematic review identifies the essential factors that enable an understanding of the barriers and possibilities for healthcare providers to implement IoT applications. Finally, the expected influence of COVID-19 on IoT adoption in healthcare was evaluated in this study.


Subject(s)
COVID-19 , Telemedicine , Wearable Electronic Devices , Delivery of Health Care , Health Personnel , Humans , Telemedicine/methods
5.
Sensors (Basel) ; 22(3)2022 Feb 01.
Article in English | MEDLINE | ID: mdl-35161859

ABSTRACT

Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws, thus generating massive workloads of cognitively demanding cases for investigators. Therefore, it is critical to develop solutions and tools that can assist investigators in their work and decision making. Automating digital forensics is not exclusively a technical problem; the technical issues are always coupled with privacy and legal matters. Here, we introduce a multi-layer automation approach that addresses the automation issues from collection to evidence analysis in online social network forensics. Finally, we propose a set of analysis operators based on domain correlations. These operators can be embedded in software tools to help the investigators draw realistic conclusions. These operators are implemented using Twitter ontology and tested through a case study. This study describes a proof-of-concept approach for forensic automation on online social networks.


Subject(s)
Semantics , Social Media , Automation , Humans , Privacy , Social Networking
6.
J King Saud Univ Comput Inf Sci ; 34(10): 8176-8206, 2022 Nov.
Article in English | MEDLINE | ID: mdl-37521180

ABSTRACT

This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps between the initial breakout of the virus and the first COVID-19-related cyber-attack, the investigation indicates how attacks became significantly more frequent over time, to the point where three or four different cyber-attacks were reported on certain days. This study contributes in the direction of fifteen types of cyber-attacks which were identified as the most common pattern and its ensuing devastating events during the global COVID-19 crisis. The paper is unique because it covered the main types of cyber-attacks that most organizations are currently facing and how to address them. An intense look into the recent advances that cybercriminals leverage, the dynamism, calculated measures to tackle it, and never-explored perspectives are some of the integral parts which make this review different from other present reviewed papers on the COVID-19 pandemic. A qualitative methodology was used to provide a robust response to the objective used for the study. Using a multi-criteria decision-making problem-solving technique, many facets of cybersecurity that have been affected during the pandemic were then quantitatively ranked in ascending order of severity. The data was generated between March 2020 and December 2021, from a global survey through online contact and responses, especially from different organizations and business executives. The result show differences in cyber-attack techniques; as hacking attacks was the most frequent with a record of 330 out of 895 attacks, accounting for 37%. Next was Spam emails attack with 13%; emails with 13%; followed by malicious domains with 9%. Mobile apps followed with 8%, Phishing was 7%, Malware 7%, Browsing apps with 6%, DDoS has 6%, Website apps with 6%, and MSMM with 6%. BEC frequency was 4%, Ransomware with 2%, Botnet scored 2% and APT recorded 1%. The study recommends that it will continue to be necessary for governments and organizations to be resilient and innovative in cybersecurity decisions to overcome the current and future effects of the pandemic or similar crisis, which could be long-lasting. Hence, this study's findings will guide the creation, development, and implementation of more secure systems to safeguard people from cyber-attacks.

7.
Neural Comput Appl ; 33(22): 15091-15118, 2021.
Article in English | MEDLINE | ID: mdl-34404964

ABSTRACT

Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, get the optimal performance of predictive models for classification tasks. FS is a vital and indispensable technique that enables the model to perform faster, eliminate noisy data, remove redundancy, reduce overfitting, improve precision and increase generalization on testing data. While conventional FS techniques have been leveraged for classification tasks in the past few decades, they fail to optimally reduce the high dimensionality of the feature space of texts, thus breeding inefficient predictive models. Emerging technologies such as the metaheuristics and hyper-heuristics optimization methods provide a new paradigm for FS due to their efficiency in improving the accuracy of classification, computational demands, storage, as well as functioning seamlessly in solving complex optimization problems with less time. However, little details are known on best practices for case-to-case usage of emerging FS methods. The literature continues to be engulfed with clear and unclear findings in leveraging effective methods, which, if not performed accurately, alters precision, real-world-use feasibility, and the predictive model's overall performance. This paper reviews the present state of FS with respect to metaheuristics and hyper-heuristic methods. Through a systematic literature review of over 200 articles, we set out the most recent findings and trends to enlighten analysts, practitioners and researchers in the field of data analytics seeking clarity in understanding and implementing effective FS optimization methods for improved text classification tasks.

SELECTION OF CITATIONS
SEARCH DETAIL
...