A multivariant secure framework for smart mobile health application

[1]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Reza Malekian,et al.  A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.

[3]  Feng Hao,et al.  PrivBox: Verifiable decentralized reputation system for online marketplaces , 2018, Future Gener. Comput. Syst..

[4]  Sasikanth Avancha,et al.  A privacy framework for mobile health and home-care systems , 2009, SPIMACS '09.

[5]  Antonio F. Gómez-Skarmeta,et al.  Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of Things , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Avijit Mathur,et al.  Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.

[7]  Leckraj Nagowah,et al.  A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).

[8]  Bhawani Shankar Chowdhry,et al.  SNR Based Digital Estimation of Security in Wireless Sensor Networks , 2009, EuropeComm.

[9]  Nancy Staggers,et al.  Scoping review and evaluation of SMS/text messaging platforms for mHealth projects or clinical interventions , 2017, Int. J. Medical Informatics.

[10]  Paulo Mendes,et al.  Relay selection approaches for wireless cooperative networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[11]  Jorge L. V. Barbosa,et al.  A Model for Ubiquitous Care of Noncommunicable Diseases , 2014, IEEE Journal of Biomedical and Health Informatics.

[12]  Angelo Ferrando,et al.  FRIENDLY & KIND with your Health: Human-Friendly Knowledge-INtensive Dynamic Systems for the e-Health Domain , 2016, PAAMS.

[13]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[14]  Jürgen Maurer,et al.  Differences in triage category, priority level and hospitalization rate between young-old and old-old patients visiting the emergency department , 2018, BMC Health Services Research.

[15]  Sherali Zeadally,et al.  IoT technologies for smart cities , 2018, IET Networks.

[16]  Jorge L. V. Barbosa,et al.  A Multi-Temporal Context-aware System for Competences Management , 2015, International Journal of Artificial Intelligence in Education.

[17]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[18]  Nathalie Bricon-Souf,et al.  Context awareness in health care: A review , 2007, Int. J. Medical Informatics.

[19]  Muhammad Alam,et al.  Detection and prevention against RTS attacks in wireless LANs , 2017, 2017 International Conference on Communication, Computing and Digital Systems (C-CODE).

[20]  Ana Ferreira,et al.  Translating GDPR into the mHealth Practice , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).

[21]  Roberto Di Pietro,et al.  Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.

[22]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[23]  Farrukh Aslam Khan,et al.  Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review , 2018, Multimedia Tools and Applications.

[24]  Cui Tao,et al.  Building a robust, scalable and standards-driven infrastructure for secondary use of EHR data: The SHARPn project , 2012, J. Biomed. Informatics.

[25]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[26]  Francesco Ricci,et al.  Distributional semantic pre-filtering in context-aware recommender systems , 2015, User Modeling and User-Adapted Interaction.

[27]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[28]  Kamin Whitehouse,et al.  A fingerprint and timing-based snooping attack on residential sensor systems , 2008, SIGBED.

[29]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[30]  Félix J. García Clemente,et al.  SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications , 2016, IEEE Systems Journal.

[31]  Marcos A. Simplício,et al.  SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection , 2015, IEEE Journal of Biomedical and Health Informatics.

[32]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[33]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[34]  Yang Yang Attribute-based data retrieval with semantic keyword search for e-health cloud , 2015, Journal of Cloud Computing.

[35]  Isabel de la Torre Díez,et al.  Privacy and Security in Mobile Health Apps: A Review and Recommendations , 2014, Journal of Medical Systems.

[36]  M. Shamim Hossain,et al.  Secure data-exchange protocol in a cloud-based collaborative health care environment , 2018, Multimedia Tools and Applications.

[37]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[38]  Tauseef Jamal,et al.  Study of Black Hole Attack in AODV , 2017 .

[39]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[40]  Jaime Lloret,et al.  An architecture and protocol for smart continuous eHealth monitoring using 5G , 2017, Comput. Networks.

[41]  Muhammad Ibrahim,et al.  Design and Application of a Multi-Variant Expert System Using Apache Hadoop Framework , 2018, Sustainability.

[42]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[43]  Henrik Grönberg,et al.  The European Parliament proposal for the new EU General Data Protection Regulation may severely restrict European epidemiological research , 2014, European Journal of Epidemiology.

[44]  B. B. Zaidan,et al.  Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.

[45]  J. Premalatha,et al.  Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing , 2016, Wirel. Pers. Commun..

[46]  Anastasiia Strielkina,et al.  Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[47]  Upkar Varshney,et al.  A model for improving quality of decisions in mobile health , 2014, Decis. Support Syst..

[48]  Katarzyna Wac,et al.  Individuals’ Stress Assessment Using Human-Smartphone Interaction Analysis , 2018, IEEE Transactions on Affective Computing.

[49]  David Blumenthal,et al.  Implementation of the federal health information technology initiative. , 2011, The New England journal of medicine.

[50]  Paulo Mendes,et al.  Cooperative relaying in user-centric networking under interference conditions , 2014, IEEE Communications Magazine.

[51]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[52]  Kin K. Leung,et al.  Context-Awareness for Mobile Sensing: A Survey and Future Directions , 2016, IEEE Communications Surveys & Tutorials.

[53]  Zhibo Pang,et al.  Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.

[54]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[55]  Carlisle George,et al.  Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases , 2017, Journal of Reliable Intelligent Environments.

[56]  William B. Lober,et al.  Applying a New Model for Sharing Population Health Data to National Syndromic Influenza Surveillance: DiSTRIBuTE Project Proof of Concept, 2006 to 2009 , 2011, PLoS currents.

[57]  Marilyn Prosch,et al.  Protecting personal information using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to enhance corporate governance , 2008 .

[58]  Ali Asghar Alesheikh,et al.  Context-aware pattern discovery for moving object trajectories , 2018 .

[59]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[60]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[61]  Avelino J. Gonzalez,et al.  Context in Computing , 2014, Springer New York.

[62]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[63]  Cong Wang,et al.  Security and privacy mechanism for health internet of things , 2013 .

[64]  Dunja Mladenic,et al.  Curious cat conversational crowd based and context aware knowledge acquisition chat bot , 2016, 2016 IEEE 8th International Conference on Intelligent Systems (IS).

[65]  Deven McGraw,et al.  Privacy and Health Information Technology , 2009, Journal of Law, Medicine & Ethics.