<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000301017</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-3-4596</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Survey of Mobile Cloud Computing Security and Privacy Issues in Healthcare]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Nabawy]]></surname>
<given-names><![CDATA[Rabab M.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hassan-Ibrahim]]></surname>
<given-names><![CDATA[Mohamed]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rabee-Kaseb]]></surname>
<given-names><![CDATA[Mostafa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Fayoum University  ]]></institution>
<addr-line><![CDATA[Fayoum ]]></addr-line>
<country>Egypt</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,October 6 University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Egypt</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>3</numero>
<fpage>1017</fpage>
<lpage>1029</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000301017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000301017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000301017&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Wireless positioning is regarded as an essential research direction across various domains. There are several wireless positioning algorithms available, with two-step positioning methods being the most significant. In order to increase positioning accuracy and efficiency, standard two-step positioning algorithms extract measurement data from the received signal, such as angles of arrival (AOA), times of arrival (TOA), and time differences of arrival (TDOA). The omnipresent healthcare system can benefit from the effective solutions offered by wireless sensor networks. A key element of the healthcare system of the future is the wireless sensor network. Cloud computing (CC), fog computing (FC), Internet of Things (IoT), and telehealthcare technologies are utilized in the healthcare industry to facilitate data sharing across diverse stakeholders. Healthcare data infringement might result from an unsafe healthcare method, giving hackers complete access to patient email addresses, messages, and reports. On the other hand, a secure method for healthcare 4.0 can raise stakeholder, patient, and caregiver satisfaction. These facts serve as the foundation for this study, which offers an extensive literature evaluation of several security issues and privacy-related healthcare concerns. Challenges and future research directions for achieving security and privacy in healthcare will be presented.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cloud computing]]></kwd>
<kwd lng="en"><![CDATA[internet of things (IoT)]]></kwd>
<kwd lng="en"><![CDATA[geographical positioning system (GPS)]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="en"><![CDATA[privacy]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidat]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadoun]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[abits: blockchain-based telesurgery framework for healthcare 4.0]]></source>
<year>2019</year>
<conf-name><![CDATA[ international conference on computer, information and telecommunication systems (CITS)]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hathaliya]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing electronics healthcare records in healthcare 4.0: A biometric-based approach]]></article-title>
<source><![CDATA[Computers &amp; Electrical Engineering]]></source>
<year>2019</year>
<volume>76</volume>
<page-range>398-410</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coventry]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Branley]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity in healthcare: A narrative review of trends, threats and ways forward]]></article-title>
<source><![CDATA[Maturitas]]></source>
<year>2018</year>
<volume>113</volume>
<page-range>48-52</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shankar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lakshmanaprabu]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Khanna]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[N. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Alzheimer detection using Group Grey Wolf Optimization based features with convolutional classifier]]></article-title>
<source><![CDATA[Computers &amp; Electrical Engineering]]></source>
<year>2019</year>
<volume>77</volume>
<page-range>230-43</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions]]></article-title>
<source><![CDATA[IEEE network]]></source>
<year>2019</year>
<volume>33</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>22-9</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumari]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Maasberg]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K. K. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multimedia big data computing and internet of things applications: A taxonomy and process model]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2018</year>
<volume>124</volume>
<page-range>169-95</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mannay]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Benhadjyoussef]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Machhout]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Urena]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Location and positioning systems: Performance and comparison]]></source>
<year>2016</year>
<conf-name><![CDATA[ 4th International Conference on Control Engineering &amp; Information Technology]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rhayem]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mhiri]]></surname>
<given-names><![CDATA[M. B. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Drira]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Tazi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gargouri]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A semanticenabled and contextaware monitoring system for the internet of medical things]]></article-title>
<source><![CDATA[Expert Systems]]></source>
<year>2021</year>
<volume>38</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>e12629</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shuaieb]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Oguntala]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[AlAbdullah]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Obeidat]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Asif]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Abd-Alhameed]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kara-Zaďtri]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[RFID RSS fingerprinting system for wearable human activity recognition]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2020</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>33</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghayvat]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Awais]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gope]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pandya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Majumdar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recognizing suspect and predicting the spread of contagion based on mobile phone location data (counteract): a system of identifying covid-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2021</year>
<volume>69</volume>
<page-range>102798</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammad]]></surname>
<given-names><![CDATA[G. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Shitharth]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[WITHDRAWN: Wireless sensor network and IoT based systems for healthcare application]]></article-title>
<source><![CDATA[]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McConville]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Archer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Craddock]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Koz&#322;owski]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Piechocki]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pope]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos-Rodriguez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vesta: A digital health analytics platform for a smart home in a box]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2021</year>
<volume>114</volume>
<page-range>106-19</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhuiyan]]></surname>
<given-names><![CDATA[M. Z. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2021</year>
<volume>114</volume>
<page-range>96-105</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akbarzadeh]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Baradaran]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khosravi]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[IoTBased smart management of healthcare services in hospital buildings during COVID19 and future pandemics]]></article-title>
<source><![CDATA[Wireless Communications and Mobile Computing]]></source>
<year>2021</year>
<volume>2021</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>5533161</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nasr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shehata]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karray]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Quintana]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart healthcare in the age of AI: recent advances, challenges, and future prospects]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>145248-70</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parvathy]]></surname>
<given-names><![CDATA[V. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pothiraj]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sampson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automated internet of medical things (IoMT) based healthcare monitoring system]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hassanien]]></surname>
<given-names><![CDATA[A.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Khamparia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shankar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Slowik]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cognitive Internet of Medical Things for Smart Healthcare, Studies in Systems, Decision and Control]]></source>
<year>2021</year>
<volume>311</volume>
<page-range>117</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[J. C. S.]]></given-names>
</name>
<name>
<surname><![CDATA[de-Lima-Silva]]></surname>
<given-names><![CDATA[D. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Neto]]></surname>
<given-names><![CDATA[A. D. S. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferraz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Melo]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Júnior]]></surname>
<given-names><![CDATA[N. R. F.]]></given-names>
</name>
<name>
<surname><![CDATA[de-Almeida-Filho]]></surname>
<given-names><![CDATA[A. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A city cluster risk-based approach for Sars-CoV-2 and isolation barriers based on anonymized mobile phone users' location data]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2021</year>
<volume>65</volume>
<numero>102574</numero>
<issue>102574</issue>
<page-range>2210-6707</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horng]]></surname>
<given-names><![CDATA[G. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[K. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The smart fall detection mechanism for healthcare under free-living conditions]]></article-title>
<source><![CDATA[Wireless Personal Communications]]></source>
<year>2021</year>
<volume>118</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>715-53</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rhayem]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mhiri]]></surname>
<given-names><![CDATA[M. B. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Drira]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Tazi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gargouri]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A semanticenabled and contextaware monitoring system for the internet of medical things]]></article-title>
<source><![CDATA[Expert Systems]]></source>
<year>2021</year>
<volume>38</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>e12629</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McConville]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Archer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Craddock]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Koz&#322;owski]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Piechocki]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pope]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos-Rodriguez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vesta: A digital health analytics platform for a smart home in a box]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2021</year>
<volume>114</volume>
<page-range>106-19</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rghioui]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lloret]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sendra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Oumnad]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A smart architecture for diabetic patient monitoring using machine learning algorithms]]></article-title>
<source><![CDATA[Healthcare]]></source>
<year>2020</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>348</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chatterjee]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing smart healthcare system with edge computing]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2021</year>
<volume>108</volume>
<page-range>102353</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sivan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Zukarnain]]></surname>
<given-names><![CDATA[Z. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and privacy in cloud-based e-health system]]></article-title>
<source><![CDATA[Symmetry]]></source>
<year>2021</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>742</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kondaka]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Thenmozhi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vijayakumar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kohli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An intensive healthcare monitoring paradigm by using IoT based machine learning strategies]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2022</year>
<volume>81</volume>
<numero>26</numero>
<issue>26</issue>
<page-range>36891-905</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aitzaouiat]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Latif]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Benslimane]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[H. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine learning based prediction and modeling in healthcare secured internet of things]]></article-title>
<source><![CDATA[Mobile Networks and Applications]]></source>
<year>2022</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>84-95</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[AlZubi]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Maitah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alarifi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques]]></article-title>
<source><![CDATA[Soft Computing]]></source>
<year>2021</year>
<volume>25</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>12319-32</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farrokhi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Farahbakhsh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rezazadeh]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Minerva]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Application of internet of things and artificial intelligence for smart fitness: A survey]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2021</year>
<volume>189</volume>
<page-range>107859</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Munadhil]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Gharghan]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mutlag]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distance estimation-based PSO between patient with Alzheimer&#8217;s disease and beacon node in wireless sensor networks]]></article-title>
<source><![CDATA[Arabian Journal for Science and Engineering]]></source>
<year>2021</year>
<volume>46</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>9345-62</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Rho]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Active loading control design for a wearable exoskeleton with a bowden cable for transmission]]></article-title>
<source><![CDATA[Actuators]]></source>
<year>2021</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>108</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shahid]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kiani]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Saeed]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Almuhaideb]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data protection and privacy of the internet of healthcare things (IoHTs)]]></article-title>
<source><![CDATA[Applied Sciences]]></source>
<year>2022</year>
<volume>12</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1927</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nag]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chandrakar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chandrakar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An improved two-factor authentication scheme for healthcare system]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2023</year>
<volume>218</volume>
<page-range>1079-90</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thatikonda]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Padthe]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaddadi]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arnepalli]]></surname>
<given-names><![CDATA[P. R. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effective secure data agreement approach-based cloud storage for a healthcare organization]]></article-title>
<source><![CDATA[International Journal of Smart Sensor and Adhoc Network]]></source>
<year>2023</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sathya-Prabha]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kanagasabapathi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Sajeeth]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Aishwarya]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Health information sharing in cloud environment using modular encryption standard]]></article-title>
<source><![CDATA[Recent Developments in Electronics and Communication Systems]]></source>
<year>2023</year>
<page-range>64-70</page-range><publisher-name><![CDATA[IOS Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nyangaresi]]></surname>
<given-names><![CDATA[V. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>2023</year>
<volume>142</volume>
<page-range>1570-8705</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
