Author:
Fourati Mariem,Meddeb-Makhlouf Amel,Zarai Faouzi
Publisher
Springer Nature Switzerland
Reference23 articles.
1. Xiong, W., Legrand, E., Åberg, O., Lagerström, R.: Cyber security threat modeling based on the MITRE enterprise ATT&CK Matrix. Softw. Syst. Model. 21(1), 157–177 (2022). https://doi.org/10.1007/s10270-021-00898-7
2. FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs | IEEE Journals & Magazine | IEEE Xplore. https://ieeexplore.ieee.org/abstract/document/9703287
3. Sengupta, J., Ruj, S., Das Bit, S.: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020). https://doi.org/10.1016/j.jnca.2019.102481
4. Pelekoudas-Oikonomou, F., et al.: Blockchain-based security mechanisms for IoMT edge networks in IoMT-based healthcare monitoring systems. Sensors 22(7), Art. no. 7 (2022). https://doi.org/10.3390/s22072449
5. Singh, S., Chawla, M., Prasad, D., Anand, D., Alharbi, A., Alosaimi, W.: An improved binomial distribution-based trust management algorithm for remote patient monitoring in WBANs. Sustainability 14(4), Art. no. 4 (2022). https://doi.org/10.3390/su14042141