{"id":"https://openalex.org/W4399141827","doi":"https://doi.org/10.1109/drcn60692.2024.10539174","title":"Toward a Secure Healthcare Ecosystem: A Convergence of Edge Analytics, Blockchain, and Federated Learning","display_name":"Toward a Secure Healthcare Ecosystem: A Convergence of Edge Analytics, Blockchain, and Federated Learning","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399141827","doi":"https://doi.org/10.1109/drcn60692.2024.10539174"},"language":"en","primary_location":{"id":"doi:10.1109/drcn60692.2024.10539174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn60692.2024.10539174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068262221","display_name":"Elarbi Badidi","orcid":"https://orcid.org/0000-0001-9121-8766"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Elarbi Badidi","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056806893","display_name":"Hanane Lamaazi","orcid":"https://orcid.org/0000-0003-2182-5258"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hanane Lamaazi","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5098932191","display_name":"Omar El Harrouss","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Omar El Harrouss","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068262221"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":1.4548,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83973353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7116677165031433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6328163743019104},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6317256689071655},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5739248991012573},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5376784205436707},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5093551874160767},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4837951362133026},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.48197096586227417},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.47075942158699036},{"id":"https://openalex.org/keywords/digitization","display_name":"Digitization","score":0.43356218934059143},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2819826006889343},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08586645126342773}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7116677165031433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6328163743019104},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6317256689071655},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5739248991012573},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5376784205436707},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5093551874160767},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4837951362133026},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.48197096586227417},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.47075942158699036},{"id":"https://openalex.org/C2779308522","wikidata":"https://www.wikidata.org/wiki/Q843958","display_name":"Digitization","level":2,"score":0.43356218934059143},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2819826006889343},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08586645126342773},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/drcn60692.2024.10539174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn60692.2024.10539174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2094547360","https://openalex.org/W2810121439","https://openalex.org/W2912213068","https://openalex.org/W2926987861","https://openalex.org/W3012501605","https://openalex.org/W3040493431","https://openalex.org/W3043102877","https://openalex.org/W3086590218","https://openalex.org/W3098532907","https://openalex.org/W3144431321","https://openalex.org/W3156226702","https://openalex.org/W3158350046","https://openalex.org/W3168496996","https://openalex.org/W3179083294","https://openalex.org/W3185276642","https://openalex.org/W3193439332","https://openalex.org/W4226461837","https://openalex.org/W4282924988","https://openalex.org/W4288778008","https://openalex.org/W4292148537","https://openalex.org/W4307498153","https://openalex.org/W4312419528","https://openalex.org/W4321760789","https://openalex.org/W4376566331","https://openalex.org/W4379471273","https://openalex.org/W6752955566","https://openalex.org/W6798064770"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W4389331041","https://openalex.org/W4237584680"],"abstract_inverted_index":{"Modern":[0],"healthcare":[1,34],"organizations":[2],"face":[3],"various":[4],"cy-bersecurity":[5],"threats":[6,15],"due":[7],"to":[8,24],"the":[9,33,89,102,115,119,131,134],"digitization":[10],"of":[11,50,93,104,114,124,133],"their":[12],"systems.":[13],"These":[14],"include":[16],"data":[17,52,63,84],"breaches,":[18],"ransomware":[19],"attacks,":[20],"and":[21,53,57,71,83,98],"unauthorized":[22],"access":[23],"patients'":[25],"sensitive":[26],"information,":[27],"which":[28],"constitute":[29],"real":[30],"challenges":[31],"for":[32,61,75,130],"ecosystem.":[35],"To":[36],"tackle":[37],"these":[38],"challenges,":[39],"advanced":[40],"security":[41],"measures":[42],"must":[43],"be":[44,128],"employed.":[45],"They":[46],"enable":[47],"real-time":[48,80],"analysis":[49],"crucial":[51],"precise":[54],"threat":[55,81],"identification":[56],"provide":[58],"robust":[59],"protection":[60],"valuable":[62],"assets.":[64],"This":[65],"paper":[66,120],"proposes":[67,121],"an":[68,110],"integrative":[69],"approach":[70,87],"a":[72,122],"system":[73],"architecture":[74],"cybersecurity":[76,103],"in":[77],"healthcare,":[78],"allowing":[79],"detection":[82],"protection.":[85],"The":[86],"integrates":[88],"three":[90],"innovative":[91],"technologies":[92],"edge":[94],"analytics,":[95],"blockchain":[96],"technology,":[97],"federated":[99],"learning.":[100],"Ensuring":[101],"Electronic":[105],"Health":[106],"Records":[107],"(EHRs)":[108],"is":[109],"illustrative":[111],"use":[112],"case":[113],"proposed":[116],"architecture.":[117,135],"Furthermore,":[118],"set":[123],"tools":[125],"that":[126],"can":[127],"used":[129],"implementation":[132]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
