Cybersecurity in healthcare applications (Record no. 10005)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04538nam a22002537a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250521142049.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250521b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781032708195 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 610.285 |
Item number | POO |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity in healthcare applications |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc. | CRC Press |
Place of publication, distribution, etc. | Boca Raton |
Date of publication, distribution, etc. | 2025 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xviii, 316 p. |
365 ## - TRADE PRICE | |
Price type code | GBP |
Price amount | 160.00 |
500 ## - GENERAL NOTE | |
General note | Table of Contents:<br/><br/>1. An introduction to the Challenges and Issues Identified in Digital Health and Wellness Cybersecurity<br/>M. J. Abinash, G. Prabu Kanna, Aanjan Kumar S., G. Sambasivam, and Karthikeyan P.<br/><br/>2. Block Chain Frameworks for Healthcare Data Storage and Exchange<br/>R. Nancy Deborah, S. Alwyn, A. Vinora, M. Soundarya, and G. Sivakarthi<br/><br/>3. Leveraging Blockchain Frameworks for Enhanced Healthcare Data Storage and Exchange<br/>Asha Vidyadharan, S. Devaraju, M.R. Thiyagu Priyadharsan, Poonkutran S., and D. Elavarasi<br/><br/>4. FOG Computing and Blockchain-Supported Identity Management for IoMT: An Advancement in Personalized Healthcare<br/>Jay Prakash Maurya, Vinesh Kumar, Aanjan Kumar S., Malathy Sathyamoorthy, and Aslina Banu R.<br/><br/>5. Artificial Intelligence and Security Management in Digital Healthcare Using Fifth Generation Communications<br/>A. Vinora, E. Lloyds, G. Sivakarthi, and M. Soundarya<br/><br/>6. Synergizing Cyber Security and Neuro-imaging Biomarkers: Innovations in Deep Learning for Diagnosis and Progression Monitoring<br/>M. Manimaran, D. Sridhar, K. B. Manikandan, S. Devaraju, and K. Thirumalai Raja<br/><br/>7. A Preview of Cybersecurity Measures in Healthcare Applications Using 5G<br/>G. Indumathi, V. Karthikeyan, and V. Arun Raj<br/><br/>8. Ensemble Based Feature Selection Method for DDoS (EBFM - DDoS) Attack Detection of Healthcare Data in Cloud Environment<br/>Somasundaram S., Devaraju V. S., Meenakshi S., Jawahar M., Manimaran, and M. Thenmozhi<br/><br/>9. An Analysis Over Identity Management for Digital Healthcare and Importance of Medical Internet of Things<br/>Sirajudeen A, Senthilnathan Palaniappan, Ilayaraja Venkatachalam, S. Saravanan, and T. Anitha<br/><br/>10. Authentication and Access Control Protocols in Digital Health and Wellness: Strengthening Security with Quantum-Resistant Cryptography<br/>D. Elavarasi and R. Kavitha<br/><br/>11. ECG-Based Authentication System with enhanced Security Using Modified CNN Classifier<br/>S. Sureshkumar, A.V. Santhosh Babu, Joseph James, and Priya R, B. Sakthivel<br/><br/>12. Ransomware and Risk management in Digital Health and Wellness security<br/>Arun Anoop M, Karthikeyan P, and Chaithanya AP<br/><br/>13. Wellness Management Using Incident Response Strategies and Recovery Tools: Practices and Proposal in Healthcare<br/>Jay Prakash Maurya, Monoj Kumar Muchahari, Mansi Bakhshi, Vinesh Kumar, and Rajesh Kumar Dhanaraj<br/><br/>14. Future Trends and Directions in Digital Health and Wellness Security<br/>V. Karthikeyan and Y. Palin Visu<br/><br/>15. Case Study on Botnet Attacks in Healthcare Sector and P2P Networks<br/>Samriddhi Tripathi, Aanjan Kumar S., Poonkuntran S., Rajesh Kumar Dhanaraj, and Malathy Sathyamoorthy<br/><br/>16. ETI-GCN: Explicit to Implicit Graph Convolution Network for Personalized Recommender System in e-Commerce and Healthcare<br/>Thenmozhi Ganesan and Palanisamy Vellaiyan<br/><br/>17. Enhancing Health Care: Gan-Based Stress Detection with Capsule Networks and Lion Optimization<br/>P. Mahalakshmi, V. Gayathri, S. Gayathri, and R. Saranya Priyadharshini |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The book explores the critical challenge of securing sensitive medical data in the face of rising cyber threats. It examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare environments. It integrates advanced technologies such as AI security applications, blockchain techniques, cryptanalysis, and 5G security to strengthen the protection of healthcare systems. By offering insights into the latest vulnerability assessment technologies and effective protection strategies, this book serves as an essential resource for professionals and researchers dedicated to enhancing cyber security in the healthcare industry.<br/><br/>(https://www.routledge.com/Cybersecurity-in-Healthcare-Applications/Poonkuntran-Dhanaraj-AanjanKumar-Sathyamoorthy/p/book/9781032708195) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cybersecurity--Healthcare services |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Poonkuntran, S. [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Dhanaraj, Rajesh Kumar [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | AanjanKumar, S [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sathyamoorthy, Malathy [Editor] |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Source of classification or shelving scheme | Dewey Decimal Classification |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Bill No | Bill Date | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Accession Number | Date last seen | Copy number | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Public Policy & General Management | 1192809 | 13-05-2025 | Indian Institute of Management LRC | Indian Institute of Management LRC | General Stacks | 05/20/2025 | Atlantic Publishers & Distributors | 12136.80 | 610.285 POO | 008742 | 05/20/2025 | 1 | 18672.00 | 05/20/2025 | Book |