{"id":"https://openalex.org/W4411972440","doi":"https://doi.org/10.32604/cmc.2025.066753","title":"Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &amp; DL with IDPS for Robust IoMT Security","display_name":"Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML &amp; DL with IDPS for Robust IoMT Security","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411972440","doi":"https://doi.org/10.32604/cmc.2025.066753"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066753","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066753","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066753","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087313412","display_name":"Saad Alanazi","orcid":"https://orcid.org/0000-0002-1714-1948"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Saad Awadh Alanazi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5082292122","display_name":"Fahad Ahmad","orcid":"https://orcid.org/0000-0001-5269-0427"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fahad Ahmad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087313412"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.1134,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.92379505,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"85","issue":"1","first_page":"769","last_page":"800"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7477999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7477999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7268000245094299,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.7190999984741211,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/triad","display_name":"Triad (sociology)","score":0.6374710202217102},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5595871210098267},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5458807945251465},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4634992778301239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4521997272968292},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.21645048260688782},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.10751998424530029},{"id":"https://openalex.org/keywords/psychoanalysis","display_name":"Psychoanalysis","score":0.07348784804344177}],"concepts":[{"id":"https://openalex.org/C176038584","wikidata":"https://www.wikidata.org/wiki/Q626432","display_name":"Triad (sociology)","level":2,"score":0.6374710202217102},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5595871210098267},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5458807945251465},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4634992778301239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4521997272968292},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.21645048260688782},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.10751998424530029},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.07348784804344177},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066753","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066753","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066753","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066753","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W2003544295","https://openalex.org/W2007087405","https://openalex.org/W2068201078","https://openalex.org/W2104927807","https://openalex.org/W2508317201","https://openalex.org/W2552699189","https://openalex.org/W2762776925","https://openalex.org/W2905396420","https://openalex.org/W2953409786","https://openalex.org/W3008633756","https://openalex.org/W3025204993","https://openalex.org/W3033675321","https://openalex.org/W3036351926","https://openalex.org/W3049501660","https://openalex.org/W3082748375","https://openalex.org/W3083285969","https://openalex.org/W3093469966","https://openalex.org/W3108827348","https://openalex.org/W3111288713","https://openalex.org/W3133377806","https://openalex.org/W3136873430","https://openalex.org/W3165327452","https://openalex.org/W3167675454","https://openalex.org/W3216106071","https://openalex.org/W4206454814","https://openalex.org/W4220730052","https://openalex.org/W4224220262","https://openalex.org/W4226319939","https://openalex.org/W4283158492","https://openalex.org/W4287225821","https://openalex.org/W4311960215","https://openalex.org/W4312918528","https://openalex.org/W4319083360","https://openalex.org/W4324284618","https://openalex.org/W4353046955","https://openalex.org/W4379618984","https://openalex.org/W4380682492","https://openalex.org/W4380986428","https://openalex.org/W4381511289","https://openalex.org/W4381956218","https://openalex.org/W4382468146","https://openalex.org/W4386963807","https://openalex.org/W4387172140","https://openalex.org/W4387189847","https://openalex.org/W4387424494","https://openalex.org/W4387805051","https://openalex.org/W4388948269","https://openalex.org/W4390494344","https://openalex.org/W4391456748","https://openalex.org/W4392139575","https://openalex.org/W4392283432","https://openalex.org/W4392377228","https://openalex.org/W4392397351","https://openalex.org/W4394699061","https://openalex.org/W4406291624","https://openalex.org/W4409730442"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2705349940","https://openalex.org/W1985099425","https://openalex.org/W2059929503","https://openalex.org/W2026663098","https://openalex.org/W2109481927","https://openalex.org/W173847922","https://openalex.org/W2912135041"],"abstract_inverted_index":{"This":[0],"study":[1],"presents":[2],"a":[3,109],"comprehensive":[4],"and":[5,24,37,61,74,88,98,105,131,141,166,184,209],"secure":[6],"architectural":[7],"framework":[8],"for":[9],"the":[10,17,21,42,58,69,149,153,194,214],"Internet":[11],"of":[12,20,63,71,112,156,182,196],"Medical":[13],"Things":[14],"(IoMT),":[15],"integrating":[16],"foundational":[18],"principles":[19,200],"Confidentiality,":[22],"Integrity,":[23],"Availability":[25],"(CIA)":[26],"triad":[27],"along":[28],"with":[29,78,136,175,187,201],"authentication":[30],"mechanisms.":[31],"Leveraging":[32],"advanced":[33,202],"Machine":[34],"Learning":[35,39],"(ML)":[36],"Deep":[38],"(DL)":[40],"techniques,":[41],"proposed":[43],"system":[44],"is":[45,81,115],"designed":[46],"to":[47,94,108,205],"safeguard":[48],"Patient-Generated":[49],"Health":[50],"Data":[51],"(PGHD)":[52],"across":[53],"interconnected":[54],"medical":[55],"devices.":[56],"Given":[57],"increasing":[59],"complexity":[60],"scale":[62],"cyber":[64],"threats":[65],"in":[66],"IoMT":[67,215],"environments,":[68],"integration":[70],"Intrusion":[72],"Detection":[73],"Prevention":[75],"Systems":[76],"(IDPS)":[77],"intelligent":[79],"analytics":[80],"critical.":[82],"Our":[83],"methodology":[84],"employs":[85],"both":[86],"standalone":[87],"hybrid":[89,167],"ML":[90,158],"&":[91],"DL":[92,168],"models":[93,159,169],"automate":[95],"threat":[96],"detection":[97,122,180],"enable":[99],"real-time":[100],"analysis,":[101],"while":[102],"ensuring":[103],"rapid":[104],"accurate":[106],"responses":[107],"diverse":[110],"array":[111],"attacks.":[113],"Emphasis":[114],"placed":[116],"on":[117,148],"systematic":[118],"model":[119],"evaluation":[120],"using":[121],"metrics":[123],"such":[124,160,170],"as":[125,161,171],"accuracy,":[126],"False":[127,132],"Alarm":[128],"Rate":[129,134],"(FAR),":[130],"Discovery":[133],"(FDR),":[135],"performance":[137,155],"validation":[138],"through":[139],"cross-validation":[140],"statistical":[142],"significance":[143],"testing.":[144],"Experimental":[145],"results":[146],"based":[147],"Edge-IIoTset":[150],"dataset":[151],"demonstrate":[152],"superior":[154],"ensemble-based":[157],"Extreme":[162],"Gradient":[163],"Boosting":[164],"(XGB)":[165],"Convolutional":[172],"Neural":[173],"Networks":[174],"Autoencoders":[176],"(CNN+AE),":[177],"which":[178],"achieved":[179],"accuracies":[181],"96%":[183],"98%,":[185],"respectively,":[186],"notably":[188],"low":[189],"FARs.":[190],"These":[191],"findings":[192],"underscore":[193],"effectiveness":[195],"combining":[197],"traditional":[198],"security":[199],"AI-driven":[203],"methodologies":[204],"ensure":[206],"secure,":[207],"resilient,":[208],"trustworthy":[210],"healthcare":[211],"systems":[212],"within":[213],"ecosystem.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
