Open Access iconOpen Access

ARTICLE

crossmark

Unified Computational Modelling for Healthcare Device Security Assessment

Shakeel Ahmed*, Abdulaziz Alhumam

Department of Computer Science, College of Computer Sciences and Information Technology King Faisal University, Al-Ahsa, 31982, Kingdom of Saudi Arabia

* Corresponding Author: Shakeel Ahmed. Email: email

Computer Systems Science and Engineering 2021, 37(1), 1-18. https://doi.org/10.32604/csse.2021.015775

Abstract

This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security. The findings of our analysis cite that Machine Learning (ML) based healthcare devices obtained the highest priority among all the other security techniques. Hence the developers, manufacturers and researchers should focus on the ML techniques for securing the healthcare devices. The results drawn through the aid of the suggested mathematical model would be a corroborative reference for the developers and the manufacturers in assessing the security techniques of the healthcare devices.

Keywords


Cite This Article

S. Ahmed and A. Alhumam, "Unified computational modelling for healthcare device security assessment," Computer Systems Science and Engineering, vol. 37, no.1, pp. 1–18, 2021. https://doi.org/10.32604/csse.2021.015775

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2694

    View

  • 1300

    Download

  • 1

    Like

Share Link