Open Access iconOpen Access



Unified Computational Modelling for Healthcare Device Security Assessment

Shakeel Ahmed*, Abdulaziz Alhumam

Department of Computer Science, College of Computer Sciences and Information Technology King Faisal University, Al-Ahsa, 31982, Kingdom of Saudi Arabia

* Corresponding Author: Shakeel Ahmed. Email: email

Computer Systems Science and Engineering 2021, 37(1), 1-18.


This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security. The findings of our analysis cite that Machine Learning (ML) based healthcare devices obtained the highest priority among all the other security techniques. Hence the developers, manufacturers and researchers should focus on the ML techniques for securing the healthcare devices. The results drawn through the aid of the suggested mathematical model would be a corroborative reference for the developers and the manufacturers in assessing the security techniques of the healthcare devices.


Cite This Article

APA Style
Ahmed, S., Alhumam, A. (2021). Unified computational modelling for healthcare device security assessment. Computer Systems Science and Engineering, 37(1), 1-18.
Vancouver Style
Ahmed S, Alhumam A. Unified computational modelling for healthcare device security assessment. Comput Syst Sci Eng. 2021;37(1):1-18
IEEE Style
S. Ahmed and A. Alhumam, "Unified Computational Modelling for Healthcare Device Security Assessment," Comput. Syst. Sci. Eng., vol. 37, no. 1, pp. 1-18. 2021.


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2801


  • 1375


  • 1


Share Link