International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 124 | Views: 146 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 12, December 2016


Review on Medical Secure Systems Using Machine Learning Algorithm

Pragati Hadole [2] | Vidya Dhamdhere [6]


Abstract: Behavior-rule specification-based technique is analyzed for intrusion detection of medical devices embedded in a medical secure system (MSS) where patients safety is of the utmost importance. Medical cyber secure systems (MSS) are used as tool for cyber attacks. This can relatively harm the patient or may even cause a direct or indirect threat to life. Intrusion detection technique helps to detect secret attackers to support safe and secure MSS applications. The present survey gives an idea of the previous work done by several researchers on the medical secure systems related applications and various techniques.


Keywords: Digital Envelope, medical data privacy, Medical secure systems, encryption


Edition: Volume 5 Issue 12, December 2016,


Pages: 1451 - 1454


How to Download this Article?

Type Your Email Address below to Download the Article PDF


Text copied to Clipboard!
Pragati Hadole, Vidya Dhamdhere, "Review on Medical Secure Systems Using Machine Learning Algorithm", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 1451-1454, https://www.ijsr.net/getabstract.php?paperid=ART20163610



Similar Articles with Keyword 'encryption'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article



Top