Cyber defense systems face increasingly sophisticated threats that rapidly evolve and exploit vulnerabilities in complex environments. Traditional approaches which often rely on centralized monitoring and static rule-based detection, struggle to adap...
Internal threats are becoming more common in today's cybersecurity landscape. This is mainly because internal personnel often have privileged access, which can be exploited for malicious purposes. Traditional detection methods frequently fail due to ...
Medical image analysis using deep learning algorithms has become a basis of modern healthcare, enabling early detection, diagnosis, treatment planning, and disease monitoring. However, sharing sensitive raw medical data with third parties for analysi...
The Internet of Medical Things (IoMT) sector has advanced rapidly in recent years, and security and privacy are essential considerations in the IoMT due to the extensive scope and implementation of IoMT networks. Machine learning (ML) and blockchain ...
The dynamical growth of cyber threats in IoT setting requires smart and scalable intrusion detection systems. In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select ...
Amid substantial capital influx and the rapid evolution of online user groups, the increasing complexity of user behavior poses significant challenges to cybersecurity, particularly in the domain of vulnerability prediction. This study aims to enhanc...
The advancement of the Internet of Medical Things (IoMT) has transformed healthcare delivery by enabling real-time health monitoring. However, it introduces critical challenges related to latency and, more importantly, the secure handling of sensitiv...
Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. ...
This paper investigates the asymptotic cluster synchronization of Boolean control networks (BCNs) under denial-of-service (DoS) attacks, where each state node in the network experiences random data loss following a Bernoulli distribution. First, the ...
As collaborative Machine Learning on cross-institutional, fully distributed networks become an important tool in predictive health modeling, its inherent security risks must be addressed. One among such risks is the lack of a mitigation strategy agai...
Join thousands of healthcare professionals staying informed about the latest AI breakthroughs in medicine. Get curated insights delivered to your inbox.