Published on in Vol 25 (2023)
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/44114, first published
.

Journals
- Kumar M, Kim S. Securing the Internet of Health Things: Embedded Federated Learning-Driven Long Short-Term Memory for Cyberattack Detection. Electronics 2024;13(17):3461 View
- Avery A, Baker E, Wright B, Avery I, Gomez D. Media Framing and Portrayals of Ransomware Impacts on Informatics, Employees, and Patients: Systematic Media Literature Review. Journal of Medical Internet Research 2025;27:e59231 View
- Kumar P. Next-generation secure authentication and access control architectures: advanced techniques for securing distributed systems in modern enterprises. International Journal of Computational and Experimental Science and Engineering 2025;11(3) View
- Jaidi F, Ksibi S. Enhancing IoMT security: an advanced FAHP-based security scoring system for medical devices evaluation. The Journal of Supercomputing 2025;81(15) View
- Diana Ussher-Eke , UgoaghalamUche James , Onum Friday Okoh . Zero Trust Onboarding in HR Tech Safeguarding Applicant Tracking Systems against Deepfake Resumes and Credential Fraud. International Journal of Scientific Research in Humanities and Social Sciences 2024;1(1):262 View
Books/Policy Documents
- Arunachalam M, Akella S, Arun Satvik D, Babu R. Convergence of Internet of Medical Things (IoMT) and Generative AI. View
