Search
Now showing items 11-20 of 32
Cybersecurity for next generation healthcare in Qatar
(
Hamad bin Khalifa University Press (HBKU Press)
, 2021 , Article)
Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ...
Design and implementation of a modular ECMO simulator
(
Hamad bin Khalifa University Press (HBKU Press)
, 2016 , Article)
Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
Fuzzy Identification-Based Encryption for healthcare user face authentication
(
Hamad bin Khalifa University Press (HBKU Press)
, 2022 , Article)
Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
(
Elsevier Ltd
, 2018 , Article)
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
Enabling broadcast communications in presence of jamming via probabilistic pairing
(
Elsevier B.V.
, 2017 , Article)
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ...
Compressive sensing based electronic nose platform
(
Elsevier
, 2017 , Article)
Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization
(
Elsevier Inc.
, 2023 , Article)
Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without ...