Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Medicine and Health Sciences
Ecu-Ioht, Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, Paul Haskell-Dowland
Ecu-Ioht, Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, Paul Haskell-Dowland
Research Datasets
In recent times, cyberattacks on Internet of Health Things (IoHT) have continuously been growing, and so it is important to develop robust countermeasures. However, there is a lack of publicly available datasets reflecting cyberattacks on IoHT, mainly due to privacy concerns. To strengthen the cyber security of IoHT, we have developed the dataset, named ECU-IoHT, that is built upon an IoHT environment having different attacks performed that exploit various vulnerabilities. This dataset was designed to help the healthcare security community in analyzing attack behaviour and developing robust countermeasures. To the best of our knowledge, no other publicly available datasets have …
Dss For The Iom What-If Analysis, Edward J. Lusk, Michael Halperin, Nellie Selander
Dss For The Iom What-If Analysis, Edward J. Lusk, Michael Halperin, Nellie Selander
Edward J. Lusk
No abstract provided.
Dss For Kls Action Plan, Edward J. Lusk, Nellie Selander
Dss For Kls Action Plan, Edward J. Lusk, Nellie Selander
Edward J. Lusk
No abstract provided.
Dss Dynamic Change Iom Rwj Project, Christine T. Kovner, Chuo H. Lee, Edward J. Lusk, Carina Catigbak, Nellie Selander
Dss Dynamic Change Iom Rwj Project, Christine T. Kovner, Chuo H. Lee, Edward J. Lusk, Carina Catigbak, Nellie Selander
Edward J. Lusk
No abstract provided.