The immense improvements in the latest internet inventions encouraged the adaptation of technology within the healthcare sector. The healthcare systems storing highly sensitive information can be targeted by attackers aiming to insert, delete, or modify the data stored. These malicious activities may cause severe damage to the database accessibility and lead to catastrophic long-term harm to the patients’ health. The adaptation of the most advanced security paradigm does not guarantee full protection. It is possible that the attack is not directly detected. This highlights the need to assess the widespread damage scale before starting the repair of the inconsistent medical database. Within the scope of the damage assessment and recovery, se...
© Springer International Publishing Switzerland 2016. In this paper, we have discussed the challenge...
This paper focuses on the emerging importance of database and application security, textbooks and ot...
© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online d...
The immense improvements in the latest internet inventions encouraged the adaptation of technology w...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
© 2019 Association for Computing Machinery. Advancements in the field of healthcare information mana...
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written p...
Due to current Covid-19 pandemic, several countries enforce lock-down to prevent pandemic outspread....
© 2019 ACM. A standout amongst the most essential strides of the knowledge discovery in database KDD...
© 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how t...
© 2018, IGI Global. The healthcare industry has been lagging behind other industries in protecting i...
© Springer International Publishing Switzerland 2015. This paper discusses how Sybil attacks can und...
© 2015 IEEE. There has been a tremendous growth in health data collection since the development of E...
© 2019 AECE. Despite availability of various image sources for specific areas, a new disaster manage...
This paper investigates the effect of common network attacks on the performance, and security of sev...
© Springer International Publishing Switzerland 2016. In this paper, we have discussed the challenge...
This paper focuses on the emerging importance of database and application security, textbooks and ot...
© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online d...
The immense improvements in the latest internet inventions encouraged the adaptation of technology w...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
© 2019 Association for Computing Machinery. Advancements in the field of healthcare information mana...
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written p...
Due to current Covid-19 pandemic, several countries enforce lock-down to prevent pandemic outspread....
© 2019 ACM. A standout amongst the most essential strides of the knowledge discovery in database KDD...
© 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how t...
© 2018, IGI Global. The healthcare industry has been lagging behind other industries in protecting i...
© Springer International Publishing Switzerland 2015. This paper discusses how Sybil attacks can und...
© 2015 IEEE. There has been a tremendous growth in health data collection since the development of E...
© 2019 AECE. Despite availability of various image sources for specific areas, a new disaster manage...
This paper investigates the effect of common network attacks on the performance, and security of sev...
© Springer International Publishing Switzerland 2016. In this paper, we have discussed the challenge...
This paper focuses on the emerging importance of database and application security, textbooks and ot...
© 2019 IEEE. With the rapid growth in online services, hacking (alternatively attacking) on online d...