Page 29 - Behdari [Elmi] - Ser 12 - Vol 6 - No 02 - Zemestan 1402-----4 [Full]_C
P. 29
77 | | عدمف وفاتت ویموت مب وسوعرموت مب ویتو اومروسر observed from the iDASH competition. Journal of the
American Medical Informatics Association. 2022;29
in Public Law. 2022;1(4):64-76. (12):2182-90. doi:10.1093/jamia/ocac165
24. Chaudhary RR, Chatterjee K. A lightweight 16. Kahouei M, Abbasi Z. The prioritization of
security framework for electronic healthcare system. effective factors on electronic health information
International Journal of Information Technology. security in medical centers. Health Information
2022;14(6):3109-21. doi:10.1007/s41870-022-0103 Management. 2015;12(2):162-170. [In Persian]
4-4
17. Brauneck A, Schmalhorst L, Kazemi Majdabadi
25. Abedini S, Sayadi S, Shokooh Z, Fatehi RN, MM, Bakhtiari M, Völker U, Baumbach J, et al.
Mollaei HR. Designing a Branding Model of Human Federated machine learning, privacy-enhancing
Resources in the Field of Health with an Islamic technologies, and data protection laws in medical
Approach. Journal of Research on Religion and research: Scoping review. Journal of Medical Internet
Health. 2023;9(1):107-21. [In Persian] Research. 2023;25:e41588. doi:10.2196/41588
26. Javaid M, Khan IH. Internet of Things (IoT) 18. Narimani K, Shojaei S, Mohammadzadeh M.
enabled healthcare helps to take the challenges of The impact of cyberattacks on medical centers.
COVID-19 Pandemic. Journal of Oral Biology and Cyberattacks and threats in the field of health and
Craniofacial Research. 2021;11(2):209-14. doi:10.10 hygiene. 3rd National Conference on Cyber Defens,
16/j.jobcr.2021.01.015 2022.
27. Dang LM, Piran MJ, Han D, Min K, Moon H. A 19. Upadhyay S, Kumar M, Upadhyay A, Verma
survey on internet of things and cloud computing for S, Kavita, Kaur M, et al. Challenges and Limitation
healthcare. Electronics. 2019;8(7):768. doi:10.3390/ Analysis of an IoT-Dependent System for Deployment
electronics8070768 in Smart Healthcare Using Communication Standards
Features. Sensors. 2023;23(11):5155. doi:10.3390/
28. Karimi Ghohroudi M, Moeinazad Sh, Karimi s23115155
E. Typology of the concept and main elements of
cyberspace innational cyber security strategy of 20. Narimani K, Nalbandy N. Cyber threats and their
selected countries. National Security. 2023;13(47):9- effects on individual and family health. Cyberattacks
36. [In Persian] and threats in the field of health and hygiene. 3rd
National Conference on Cyber Defens, 2022.
29. Mirvahabi N. A method to protect location
privacy using semantic technology in the Internet 21. Nguyen GN, Le Viet NH, Elhoseny M, Shankar
of Things. Master thesis in computer engineering- K, Gupta BB, Abd El-Latif AA. Secure blockchain
software. Payam Noor University of Tehran Province, enabled Cyber–physical systems in healthcare using
2021. deep belief network with ResNet model. Journal of
parallel and Distributed Computing. 2021;153:150-
30. Mozdoriane Mehdiabad F. Improving the 60. doi:10.1016/j.jpdc.2021.03.011
accuracy of the network intrusion detection systems
in medical internet of things systems through the 22. Dehghani M, Rahmatpasand-Fatideh Z, Arasteh
combined algorithm of salp collective intelligence and Z, Shokrizadeh-Bezenjani K. Knowledge, attitude,
sine cosine. Master thesis in computer Engineering and performance of health information management
– Secure Computing. Imam Reza International staff of Iranian hospitals about health information
University, College of Technology and Engineering, security. Health Information Management. 2019;16
2021. (1):3-9. doi:10.22122/him.v16i1.3727
31. Lv Z, Qiao L. Analysis of healthcare big data. 23. Bloordi T, Tayyari Pourahmadi M. Government
Future Generation Computer Systems. 2020;109: actions in creating cyber security. New Achievements
103-10. doi:10.1016/j.future.2020.03.039
Journal of Combat Medicine 2023 | Vol 6 | No. 2