Adil Hussain Seh
YOU?
Author Swipe
View article: Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method
Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method Open
To address this research possibility, the present empirical study undertakes the assessment of usable-security of healthcare software system. The attributes considered for the assessment are: four factors at first level; thirteen sub-facto…
View article: An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records
An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records Open
The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare. Despi…
View article: Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems
Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems Open
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an in…
View article: Healthcare Device Security Assessment through Computational Methodology
Healthcare Device Security Assessment through Computational Methodology Open
The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) inte…
View article: Hybrid Computational Modeling for Web Application Security Assessment
Hybrid Computational Modeling for Web Application Security Assessment Open
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry pla…
View article: Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment
Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment Open
Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensiti…
View article: Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems
Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems Open
In recent years, numerous attempts have been made to enhance the living standard for old-aged people. Ambient Assisted Living (AAL) is an evolving interdisciplinary field aimed at the exploitation of knowledge and communication technology …
View article: Machine Learning Based Framework for Maintaining Privacy of Healthcare Data
Machine Learning Based Framework for Maintaining Privacy of Healthcare Data Open
The Adoption of Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), cloud services, web-based software systems, and other wireless sensor devices in the healthcare infrastructure have led to phenomenal improvemen…
View article: Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia
Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia Open
Ever since its outbreak in Wuhan, COVID-19 has cloaked the entire world in a pall of despondency and uncertainty. The present study describes the exploratory analysis of all COVID cases in Saudi Arabia. Besides, the study has executed the …
View article: Healthcare Data Breaches: Insights and Implications
Healthcare Data Breaches: Insights and Implications Open
The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment…
View article: Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective Open
Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for sof…