메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Sultan H. Almotiri (Umm Al-Qura University) Mohd Nadeem (Babu Banarasi Das University) Mohammed A. Al Ghamdi (Umm Al-Qura University) Raees Ahmad Khan (Babasaheb Bhimrao Ambedkar University)
저널정보
한국지능시스템학회 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS Vol.23 No.3
발행연도
2023.9
수록면
336 - 352 (17page)
DOI
10.5391/IJFIS.2023.23.3.336

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.

목차

Abstract
1. Introduction
2. Literature Review
3. Factors and Alternative of HSS
4. Methodology
5. Data Analysis
6. Comparison of HS Security with Classical AHP-TOPSIS method
7. Sensitivity Analysis
8. Conclusion
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0102-2023-003-002056323