Open Access

ARTICLE

Unified Computational Modelling for Healthcare Device Security Assessment

Shakeel Ahmed*, Abdulaziz Alhumam
Department of Computer Science, College of Computer Sciences and Information Technology King Faisal University, Al-Ahsa, 31982, Kingdom of Saudi Arabia
* Corresponding Author: Shakeel Ahmed. Email:

Computer Systems Science and Engineering 2021, 37(1), 1-18. https://doi.org/10.32604/csse.2021.015775

Received 16 November 2020; Accepted 20 December 2020; Issue published 05 February 2021

Abstract

This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security. The findings of our analysis cite that Machine Learning (ML) based healthcare devices obtained the highest priority among all the other security techniques. Hence the developers, manufacturers and researchers should focus on the ML techniques for securing the healthcare devices. The results drawn through the aid of the suggested mathematical model would be a corroborative reference for the developers and the manufacturers in assessing the security techniques of the healthcare devices.

Keywords

Medical devices; fuzzy-ANP.TOPSIS; security techniques; machine learning

Cite This Article

S. Ahmed and A. Alhumam, "Unified computational modelling for healthcare device security assessment," Computer Systems Science and Engineering, vol. 37, no.1, pp. 1–18, 2021.

Citations




This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1996

    View

  • 912

    Download

  • 1

    Like

Share Link

WeChat scan