{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T02:07:14Z","timestamp":1778206034618,"version":"3.51.4"},"reference-count":181,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09686-z","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T17:13:19Z","timestamp":1752772399000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7838-6546","authenticated-orcid":false,"given":"Anayo Chukwu","family":"Ikegwu","sequence":"first","affiliation":[]},{"given":"Uzoma Rita","family":"Alo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5196-764X","authenticated-orcid":false,"given":"Henry Friday","family":"Nweke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"key":"9686_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph19073747","author":"RSH Istepanian","year":"2022","unstructured":"Istepanian RSH. Mobile health (m-Health) in retrospect: the known unknowns. Int J Environ Res Public Health. 2022. https:\/\/doi.org\/10.3390\/ijerph19073747.","journal-title":"Int J Environ Res Public Health"},{"key":"9686_CR2","unstructured":"Simple C, Telehealth vs Telemedicine vs mHealth, and, How RPMF. In, CareSimple Inc. Accessed: Feb. 10, 2025. [Online]. Available: https:\/\/caresimple.com\/telehealth-vs-telemedicine-vs-mhealth-and-how-rpm-fits-in\/"},{"issue":"4","key":"9686_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s23042112","volume":"23","author":"M Moshawrab","year":"2023","unstructured":"Moshawrab M, Adda M, Bouzouane A, Ibrahim H, Raad A. Reviewing federated machine learning and its use in diseases prediction. Sensors. 2023;23(4):1\u201339. https:\/\/doi.org\/10.3390\/s23042112.","journal-title":"Sensors"},{"key":"9686_CR4","unstructured":"Anikwe CV et al. Mobile and wearable devices for health monitoring: review of sensors, components modules, applications and future prospects. Expert Syst Appl. 117362, 2022."},{"key":"9686_CR5","doi-asserted-by":"publisher","first-page":"103754","DOI":"10.1016\/j.cose.2024.103754","volume":"140","author":"H Thanh","year":"2024","unstructured":"Thanh H, et al. Agriculture 4. 0 and beyond: evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput Secur. 2024;140:103754. https:\/\/doi.org\/10.1016\/j.cose.2024.103754.","journal-title":"Comput Secur"},{"key":"9686_CR6","doi-asserted-by":"publisher","unstructured":"Fereidooni H, Dmitrienko A, Rieger P, Miettinen M, Sadeghi AR, Madlener F. FedCRI: Federated Mobile Cyber-Risk Intelligence, 29th Annual Network and Distributed System Security Symposium, NDSS 2022, no. April, 2022, https:\/\/doi.org\/10.14722\/ndss.2022.23153","DOI":"10.14722\/ndss.2022.23153"},{"key":"9686_CR7","unstructured":"Pappas G, Walther T, Mattila S, Denis T, Brock G. Cybersecurity Nightmares: The Cost of Healthcare Cyberattacks in 2024, Intraprisehealth. [Online]. Available: https:\/\/intraprisehealth.com\/the-cost-of-cyberattacks-in-healthcare\/"},{"key":"9686_CR8","unstructured":"Southwick R. The 10 largest health data breaches of the first half of 2024, 2024."},{"key":"9686_CR9","unstructured":"Sunnyvale C, Third Annual Ponemon Institute Report. Nearly Seven in 10 Healthcare Organizations Experienced Disruption to Patient Care Due to Cyber Attacks,: 2024."},{"key":"9686_CR10","unstructured":"Dall E. Healthcare Industry Biggest Attacks (2023\u2013\u20092024), 2024."},{"key":"9686_CR11","unstructured":"Bruce G. Hospital cyberattack costs, patient care disruptions up: 9 things to know, 2023."},{"key":"9686_CR12","unstructured":"Joel W, Healthcare Cyber Attack Statistics. 2022: 25 Alarming Data Breaches You Should Know, Expert Insights. Accessed: Oct. 20, 2024. [Online]. Available: https:\/\/expertinsights.com\/insights\/healthcare-cyber-attack-statistics\/"},{"key":"9686_CR13","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez Berm\u00fadez A, Carrami\u00f1ana D, Bernardos AM, Bergesio L, Besada JA. A fusion architecture to deliver multipurpose mobile health services. Comput Biol Med. 2024;173. https:\/\/doi.org\/10.1016\/j.compbiomed.2024.108344.","DOI":"10.1016\/j.compbiomed.2024.108344"},{"key":"9686_CR14","doi-asserted-by":"publisher","unstructured":"Ghayoomi H, Laskey K, Miller-Hooks E, Hooks C, Tariverdi M. Assessing resilience of hospitals to cyberattack. Digit Health. 2021;7. https:\/\/doi.org\/10.1177\/20552076211059366.","DOI":"10.1177\/20552076211059366"},{"key":"9686_CR15","doi-asserted-by":"publisher","unstructured":"Kumar M, Yadav V, Yadav SP. Advance comprehensive analysis for zigbee network-based IoT system security. Discover Computing. 2024. https:\/\/doi.org\/10.1007\/s10791-024-09456-3.","DOI":"10.1007\/s10791-024-09456-3"},{"issue":"8","key":"9686_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19081788","volume":"19","author":"N Tariq","year":"2019","unstructured":"Tariq N, et al. The security of big data in fog-enabled Iot applications including blockchain: A survey. Sens (Switzerland). 2019;19(8):1\u201333. https:\/\/doi.org\/10.3390\/s19081788.","journal-title":"Sens (Switzerland)"},{"key":"9686_CR17","unstructured":"Meyers A, Shirk B, Zaitsev E, Etheridge T. 2023 Global Threat Report: From Relentless Adversaries to Resilient Businesses, 2024."},{"key":"9686_CR18","unstructured":"Lau J. State of Cybersecurity 2023: Navigating Current and Emerging Threats, 2023."},{"key":"9686_CR19","unstructured":"Sullivan B. The 2024 Study on Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care, 2024."},{"issue":"2","key":"9686_CR20","first-page":"1","volume":"3","author":"SS Balantrapu","year":"2024","unstructured":"Balantrapu SS. Current trends and future directions exploring machine learning techniques for cyber threat detection. Int J Sustainable Dev Through AI. 2024;3(2):1\u201315. ML and IoT.","journal-title":"Int J Sustainable Dev Through AI"},{"key":"9686_CR21","doi-asserted-by":"publisher","unstructured":"Wang T, et al. Federated Learning-based information leakage risk detection for secure medical internet of things. ACM Trans Internet Technol. 2024;1\u201321. https:\/\/doi.org\/10.1145\/3639466.","DOI":"10.1145\/3639466"},{"key":"9686_CR22","doi-asserted-by":"publisher","unstructured":"Kumar A, Mozar S. Lecture Notes in Electrical Engineering, in ICCCE: International Conference on Communications and Cyber Physical Engineering 2018, Singapore: Springer Nature Singapore Pte Ltd, 2019, pp. 1\u2013775. https:\/\/doi.org\/10.1007\/978-981-13-0212-1","DOI":"10.1007\/978-981-13-0212-1"},{"issue":"15","key":"9686_CR23","first-page":"3782","volume":"99","author":"UR Alo","year":"2021","unstructured":"Alo UR, Nweke HF, Ele SI. Machine learning-based framework for automatic malware detection using Android traffic data. J Theor Appl Inf Technol. 2021;99(15):3782\u2013800.","journal-title":"J Theor Appl Inf Technol"},{"issue":"3","key":"9686_CR24","doi-asserted-by":"publisher","first-page":"478","DOI":"10.51594\/csitrj.v4i3.1500","volume":"4","author":"KD Ofoegbu","year":"2023","unstructured":"Ofoegbu KD, Osundare OS, Ike CS, Fakeyede OG, Ige AB. Real-Time cybersecurity threat detection using machine learning and big data analytics: A comprehensive approach. Comput Sci IT Res J. 2023;4(3):478\u2013501. https:\/\/doi.org\/10.51594\/csitrj.v4i3.1500.","journal-title":"Comput Sci IT Res J"},{"key":"9686_CR25","doi-asserted-by":"publisher","unstructured":"Duary S, Choudhury P, Mishra S, Sharma V, Rao DD, Aderemi AP. Cybersecurity Threats Detection in Intelligent Networks using Predictive Analytics Approaches, in 4th International Conference on Innovative Practices in Technology and Management 2024, ICIPTM 2024, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICIPTM59628.2024.10563348","DOI":"10.1109\/ICIPTM59628.2024.10563348"},{"key":"9686_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2023.105022","author":"KK Coelho","year":"2023","unstructured":"Coelho KK, Trist\u00e3o ET, Nogueira M, Vieira AB, Nacif JAM. Multimodal biometric authentication method by federated learning. Biomed Signal Process Control. 2023. https:\/\/doi.org\/10.1016\/j.bspc.2023.105022.","journal-title":"Biomed Signal Process Control"},{"key":"9686_CR27","doi-asserted-by":"publisher","unstructured":"Weichbroth P, \u0141ysik \u0141. Mobile security: threats and best practices. Mob Inform Syst. 2020;2020. https:\/\/doi.org\/10.1155\/2020\/8828078.","DOI":"10.1155\/2020\/8828078"},{"key":"9686_CR28","doi-asserted-by":"publisher","unstructured":"Sakib SMN. Cyber threat intelligence. Cyber Threat Intell. 2022;1\u2013276. https:\/\/doi.org\/10.1002\/9781119861775.","DOI":"10.1002\/9781119861775"},{"key":"9686_CR29","unstructured":"Arazzi M et al. NLP-Based Techniques for Cyber Threat Intelligence, arXiv:2311.08807v1 [cs.CR], pp. 1\u201363, 2023."},{"key":"9686_CR30","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph192013071","author":"CO Alenoghena","year":"2022","unstructured":"Alenoghena CO, et al. eHealth: a survey of architectures, developments in mHealth, security concerns and solutions. Int J Environ Res Public Health. 2022. https:\/\/doi.org\/10.3390\/ijerph192013071.","journal-title":"Int J Environ Res Public Health"},{"issue":"5","key":"9686_CR31","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s10877-023-01013-5","volume":"37","author":"AJ Cartwright","year":"2023","unstructured":"Cartwright AJ. The elephant in the room: cybersecurity in healthcare. J Clin Monit Comput. 2023;37(5):1123\u201332. https:\/\/doi.org\/10.1007\/s10877-023-01013-5.","journal-title":"J Clin Monit Comput"},{"key":"9686_CR32","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.iotcps.2023.09.003","volume":"4","author":"A Aldhaheri","year":"2024","unstructured":"Aldhaheri A, Alwahedi F, Ferrag MA, Battah A. Deep learning for cyber threat detection in IoT networks: a review. Internet Things Cyber-Physical Syst. 2024;4:110\u201328. https:\/\/doi.org\/10.1016\/j.iotcps.2023.09.003.","journal-title":"Internet Things Cyber-Physical Syst"},{"key":"9686_CR33","doi-asserted-by":"publisher","first-page":"104004","DOI":"10.1016\/j.jnca.2024.104004","volume":"232","author":"A Mahboubi","year":"2024","unstructured":"Mahboubi A, et al. Evolving techniques in cyber threat hunting: A systematic review. J Netw Comput Appl. 2024;232:104004. https:\/\/doi.org\/10.1016\/j.jnca.2024.104004.","journal-title":"J Netw Comput Appl"},{"key":"9686_CR34","unstructured":"ElSayed Z, Abdelgawad A, Elsayed N. Cybersecurity and Frequent Cyber Attacks on IoT Devices in Healthcare: Issues and Solutions, arXiv preprint arXiv:2501.11250., 2025, [Online]. Available: http:\/\/arxiv.org\/abs\/2501.11250"},{"key":"9686_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.nedt.2023.105803","volume":"125","author":"R Randles","year":"2023","unstructured":"Randles R, Finnegan A. Guidelines for writing a systematic review. Nurse Educ Today. 2023;125: 105803. https:\/\/doi.org\/10.1016\/j.nedt.2023.105803.","journal-title":"Nurse Educ Today"},{"key":"9686_CR36","doi-asserted-by":"publisher","first-page":"101895","DOI":"10.1016\/j.mex.2022.101895","volume":"9","author":"A Carrera-Rivera","year":"2022","unstructured":"Carrera-Rivera A, Ochoa W, Larrinaga F, Lasa G. How-to conduct a systematic literature review: A quick guide for computer science research. MethodsX. 2022;9:101895. https:\/\/doi.org\/10.1016\/j.mex.2022.101895.","journal-title":"MethodsX"},{"key":"9686_CR37","unstructured":"Fitzpatrick L. The Future of Healthcare Is Mobile, 2021."},{"key":"9686_CR38","unstructured":"Cousineau C. Healthcare\u2019s Evolution: Important Healthcare Trends in 2024, 2024."},{"key":"9686_CR39","unstructured":"Bocas J. Emerging Mobile Health Trends in 2024, 2023."},{"key":"9686_CR40","unstructured":"Martinez A. Mobile Health Apps: How Are They Reshaping Healthcare in 2024, 2024."},{"issue":"4","key":"9686_CR41","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1109\/JSAC.2023.3345381","volume":"42","author":"J Hu","year":"2023","unstructured":"Hu J, Jiang H, Xiao Z, Chen S, Dustdar S, Liu J. HeadTrack: Real-Time Human\u2013Computer interaction via wireless earphones. IEEE J Sel Areas Commun. 2023;42(4):990\u20131002.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"9686_CR42","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"Y Sun, Gang","year":"2018","unstructured":"Sun, Gang Y, Li D, Liao, Victor, Chang. Service function chain orchestration across multiple domains: A full mesh aggregation approach. IEEE Trans Netw Serv Manage. 2018;15(3):1175\u201391.","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"2","key":"9686_CR43","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSC.2015.2477825","volume":"11","author":"G Sun","year":"2015","unstructured":"Sun G, Liao D, Zhao D, Xu Z. Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput. 2015;11(2):279\u201391.","journal-title":"IEEE Trans Serv Comput"},{"key":"9686_CR44","doi-asserted-by":"publisher","unstructured":"Shivhare I, Jogani V, Purohit J, Shrawne SC. Analysis of Explainable Artificial Intelligence Methods on Medical Image Classification, 2023 3rd International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2023, 2023. https:\/\/doi.org\/10.1109\/ICAECT57570.2023.10118312","DOI":"10.1109\/ICAECT57570.2023.10118312"},{"issue":"6","key":"9686_CR45","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-981-99-2746-3_37","volume":"F1493","author":"V Pabalkar","year":"2023","unstructured":"Pabalkar V, Chanda R. Role of artificial intelligence in healthcare. Cogn Sci Technol. 2023;F1493(6):353\u201360. https:\/\/doi.org\/10.1007\/978-981-99-2746-3_37. Part.","journal-title":"Cogn Sci Technol"},{"issue":"1","key":"9686_CR46","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/s11356-021-15481-2","volume":"29","author":"A Rehman","year":"2022","unstructured":"Rehman A, Ma H, Ozturk I, Ahmad MI. Examining the carbon emissions and climate impacts on main agricultural crops production and land use: updated evidence from Pakistan. Environ Sci Pollut Res. 2022;29(1):868\u201382.","journal-title":"Environ Sci Pollut Res"},{"key":"9686_CR47","unstructured":"Boiano A et al. A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications, arXiv:2404.11698v1 [cs.AI], vol. 1, no. 101080564, 2024."},{"key":"9686_CR48","doi-asserted-by":"publisher","unstructured":"Mazhar T, Shahzad T, Amir M, Generative AI. IoT, and blockchain in healthcare: application, issues, and solutions. Discover Internet Things. 2025;5(5). https:\/\/doi.org\/10.1007\/s43926-025-00095-8.","DOI":"10.1007\/s43926-025-00095-8"},{"key":"9686_CR49","doi-asserted-by":"publisher","first-page":"106019","DOI":"10.1016\/j.compbiomed.2022.106019","volume":"150","author":"A Rehman","year":"2022","unstructured":"Rehman A, Sagheer A, Khan MA, Ghazal TM, Adnan KM, Mosavi A. A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Comput Biol Med. 2022;150:106019. https:\/\/doi.org\/10.1016\/j.compbiomed.2022.106019.","journal-title":"Comput Biol Med"},{"key":"9686_CR50","doi-asserted-by":"publisher","unstructured":"Alhomsi Y, Alsalemi A, Al Disi M, Bensaali F, Amira A, Alinier G. CouchDB based Real-Time wireless communication system for clinical simulation. Proc\u2013 20th Int Conf High Perform Comput Commun 16th Int Conf Smart City 4th Int Conf Data Sci Syst HPCC\/SmartCity\/DSS 2018. 2019;1094\u20138. https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00182.","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00182"},{"issue":"2","key":"9686_CR51","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MWC.001.1900119","volume":"27","author":"J Kang","year":"2020","unstructured":"Kang J, Xiong Z, Niyato D, Zou Y, Zhang Y, Guizani M. Reliable federated learning for mobile networks. IEEE Wirel Commun. 2020;27(2):72\u201380. https:\/\/doi.org\/10.1109\/MWC.001.1900119.","journal-title":"IEEE Wirel Commun"},{"key":"9686_CR52","doi-asserted-by":"crossref","unstructured":"Leith DJ, Farrell S. Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection, scss.tcd.ie, pp. 1\u201311, 2020.","DOI":"10.1145\/3431832.3431840"},{"issue":"6","key":"9686_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2196\/13300","volume":"21","author":"AJ Greenberg-Worisek","year":"2019","unstructured":"Greenberg-Worisek AJ, Kurani S, Finney Rutten LJ, Blake KD, Moser RP, Hesse BW. Tracking healthy people 2020 internet, broadband, and mobile device access goals: an update using data from the health information National trends survey. J Med Internet Res. 2019;21(6):1\u201311. https:\/\/doi.org\/10.2196\/13300.","journal-title":"J Med Internet Res"},{"key":"9686_CR54","doi-asserted-by":"publisher","unstructured":"Subasi A, Bandic L, Qaisar SM. Cloud-based health monitoring framework using smart sensors and smartphone. Elsevier Inc.; 2020. https:\/\/doi.org\/10.1016\/B978-0-12-819043-2.00009-5.","DOI":"10.1016\/B978-0-12-819043-2.00009-5"},{"key":"9686_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-11063-z","author":"SE El-deep","year":"2025","unstructured":"El-deep SE, Abohany AA, Sallam KM, El-Mageed AAA. A comprehensive survey on impact of applying various technologies on the internet of medical things. Artif Intell Rev. 2025. https:\/\/doi.org\/10.1007\/s10462-024-11063-z.","journal-title":"Artif Intell Rev"},{"issue":"3","key":"9686_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501296","volume":"55","author":"DC Nguyen","year":"2022","unstructured":"Nguyen DC, et al. Federated learning for smart healthcare: A survey. ACM Comput Surv. 2022;55(3):1\u201335. https:\/\/doi.org\/10.1145\/3501296.","journal-title":"ACM Comput Surv"},{"issue":"1","key":"9686_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41599-024-04295-5","volume":"12","author":"Q Ma","year":"2025","unstructured":"Ma Q, Zhang Y, Zhou FHH, Hao H. Nip it in the bud: the impact of china\u2019s large-scale free physical examination program on health care expenditures for elderly people. Humanit Social Sci Commun. 2025;12(1):1\u201316.","journal-title":"Humanit Social Sci Commun"},{"key":"9686_CR58","doi-asserted-by":"publisher","first-page":"15867","DOI":"10.1109\/ACCESS.2024.3357514","volume":"12","author":"DN Sachin","year":"2024","unstructured":"Sachin DN, Annappa B, Hegde S, Abhijit CS, Ambesange S. FedCure: A Heterogeneity-Aware personalized federated learning framework for intelligent healthcare applications in IoMT environments. IEEE Access. 2024;12:15867\u201383. https:\/\/doi.org\/10.1109\/ACCESS.2024.3357514.","journal-title":"IEEE Access"},{"key":"9686_CR59","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.future.2018.12.001","volume":"98","author":"L Haoyu","year":"2018","unstructured":"Haoyu L, Jianxing L, Arunkumar N, Hussein AF, Jaber M. An IoMT cloud-based real time sleep apnea detection scheme by using the SpO2 estimation supported by heart rate variability. Future Gener Comput Syst. 2018;98:69\u201377.","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"9686_CR60","doi-asserted-by":"publisher","first-page":"3341","DOI":"10.1109\/JBHI.2023.3300173","volume":"28","author":"L Zhang","year":"2024","unstructured":"Zhang L, Wu Y, Chen L, Fan L, Nallanathan A. Scoring aided federated learning on Long-Tailed data for wireless IoMT based healthcare system. IEEE J Biomed Health Inf. 2024;28(6):3341\u20138. https:\/\/doi.org\/10.1109\/JBHI.2023.3300173.","journal-title":"IEEE J Biomed Health Inf"},{"key":"9686_CR61","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/j.future.2024.07.035","volume":"161","author":"A Aminifar","year":"2024","unstructured":"Aminifar A, Shokri M, Aminifar A. Privacy-preserving edge federated learning for intelligent mobile-health systems. Future Gener Comput Syst. 2024;161:625\u201337. https:\/\/doi.org\/10.1016\/j.future.2024.07.035.","journal-title":"Future Gener Comput Syst"},{"key":"9686_CR62","doi-asserted-by":"publisher","first-page":"1518327","DOI":"10.3389\/fpubh.2025.1518327","volume":"13","author":"F Hu","year":"2025","unstructured":"Hu F, Yang H, Qiu L, Wei S, Hao Hu, and, Zhou H. Spatial structure and organization of the medical device industry urban network in china: evidence from specialized, refined, distinctive, and innovative firms. Front Public Health. 2025;13:1518327.","journal-title":"Front Public Health"},{"key":"9686_CR63","doi-asserted-by":"publisher","unstructured":"Anikwe CV, et al. Mobile and wearable sensors for data-driven health monitoring system: State-of-the-art and future prospect. Expert Syst Appl. Sep. 2022;202:117362. https:\/\/doi.org\/10.1016\/j.eswa.2022.117362.","DOI":"10.1016\/j.eswa.2022.117362"},{"key":"9686_CR64","doi-asserted-by":"publisher","unstructured":"Vekaria D, Kumari A, Tanwar S, Kumar N. \u03be boost: an AI-based data analytics scheme for COVID-19 prediction and economy boosting. Internet Things J. 2021;1\u201312. https:\/\/doi.org\/10.1109\/JIOT.2020.3047539.","DOI":"10.1109\/JIOT.2020.3047539"},{"issue":"1","key":"9686_CR65","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1021\/acsnano.0c06807","volume":"15","author":"A Shokr","year":"2022","unstructured":"Shokr A, et al. Mobile health (mHealth) viral diagnostics enabled with adaptive adversarial learning. ACS Nano. 2022;15(1):665\u201373. https:\/\/doi.org\/10.1021\/acsnano.0c06807.","journal-title":"ACS Nano"},{"key":"9686_CR66","doi-asserted-by":"publisher","unstructured":"Moshawrab M, Adda M, Bouzouane A, Ibrahim H, Raad A. Cardiovascular Events Prediction using Artificial Intelligence Models and Heart Rate Variability, Procedia Comput Sci, vol. 203, no. 2019, pp. 231\u2013238, 2022. https:\/\/doi.org\/10.1016\/j.procs.2022.07.030","DOI":"10.1016\/j.procs.2022.07.030"},{"key":"9686_CR67","doi-asserted-by":"publisher","unstructured":"Dayakaran D, Kadiresan N. Federated Learning Framework for Human Activity Recognition Using Smartphones, Procedia Comput Sci, vol. 235, no. 2023, pp. 2069\u20132078, 2024. https:\/\/doi.org\/10.1016\/j.procs.2024.04.196","DOI":"10.1016\/j.procs.2024.04.196"},{"key":"9686_CR68","unstructured":"Nweke H, Ikegwu AC, Nwafor CA, Ogbaga IN. Smartphone-based human activity recognition using Artificial Intelligence Methods and Orientation Invariant Features, Nigeria Computer Society: International Conference on Technological Solutions for Smart Economy, SmartEco2024, vol. 35, pp. 1\u20138, 2024."},{"key":"9686_CR69","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.aej.2024.12.090","volume":"116","author":"A Khamaj","year":"2025","unstructured":"Khamaj A. Ai-enhanced chatbot for improving healthcare usability and accessibility for older adults. Alexandria Eng J. 2025;116:202\u201313. https:\/\/doi.org\/10.1016\/j.aej.2024.12.090.","journal-title":"Alexandria Eng J"},{"issue":"8","key":"9686_CR70","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1109\/TMC.2020.3045266","volume":"21","author":"Q Wu","year":"2022","unstructured":"Wu Q, Chen X, Zhou Z, Zhang J. Fedhome: cloud-edge based personalized federated learning for in-home health monitoring. IEEE Trans Mob Comput. 2022;21(8):2818\u201332. https:\/\/doi.org\/10.1109\/TMC.2020.3045266.","journal-title":"IEEE Trans Mob Comput"},{"key":"9686_CR71","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10233013","author":"A Verma","year":"2021","unstructured":"Verma A, Agarwal G, Gupta AK, Sain M. Novel hybrid intelligent secure cloud internet of things based disease prediction and diagnosis. Electronics. 2021. https:\/\/doi.org\/10.3390\/electronics10233013.","journal-title":"Electronics"},{"key":"9686_CR72","doi-asserted-by":"publisher","unstructured":"Stergiou C, Psannis KE, Kim B, Gupta B. Secure Integration of Internet-of-Things and Cloud Computing Secure integration of IoT and Cloud Computing, Future Generation Computer Systems, vol. 78, no. December, pp. 964\u2013975, 2016, https:\/\/doi.org\/10.1016\/j.future.2016.11.031","DOI":"10.1016\/j.future.2016.11.031"},{"key":"9686_CR73","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.future.2018.04.036","volume":"86","author":"PM Kumar","year":"2018","unstructured":"Kumar PM, Lokesh S, Varatharajan R, Chandra Babu G, Parthasarathy P. Cloud and IoT based disease prediction and diagnosis system for healthcare using fuzzy neural classifier. Future Gener Comput Syst. 2018;86:527\u201334. https:\/\/doi.org\/10.1016\/j.future.2018.04.036.","journal-title":"Future Gener Comput Syst"},{"key":"9686_CR74","doi-asserted-by":"publisher","unstructured":"Ishikiriyama CS, Francisco C, Gomes S. Big data: a global overview. Cham: Springer; 2019. https:\/\/doi.org\/10.1007\/978-3-319-93061-9.","DOI":"10.1007\/978-3-319-93061-9"},{"key":"9686_CR75","doi-asserted-by":"publisher","unstructured":"Alars ESA, Kurnaz S. Enhancing network intrusion detection systems with combined network and host traffic features using deep learning: deep learning and IoT perspective. Discover Comput. 2024;27(1). https:\/\/doi.org\/10.1007\/s10791-024-09480-3.","DOI":"10.1007\/s10791-024-09480-3"},{"issue":"1","key":"9686_CR76","doi-asserted-by":"publisher","first-page":"179","DOI":"10.32996\/jcsts.2024.6.1.19","volume":"6","author":"MR Labu","year":"2024","unstructured":"Labu MR, Ahammed MF. Next-Generation cyber threat detection and mitigation strategies: A focus on artificial intelligence and machine learning. J Comput Sci Technol Stud. 2024;6(1):179\u201388. https:\/\/doi.org\/10.32996\/jcsts.2024.6.1.19.","journal-title":"J Comput Sci Technol Stud"},{"key":"9686_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100206","volume":"7","author":"AK Dey","year":"2023","unstructured":"Dey AK, Gupta GP, Sahu SP. A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks. Decis Anal J. 2023;7: 100206. https:\/\/doi.org\/10.1016\/j.dajour.2023.100206.","journal-title":"Decis Anal J"},{"key":"9686_CR78","doi-asserted-by":"publisher","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee J, Kim J, Kim I, Han K. Cyber threat detection based on artificial neural networks using event profiles. IEEE Access. 2019;7:165607\u201326. https:\/\/doi.org\/10.1109\/ACCESS.2019.2953095.","journal-title":"IEEE Access"},{"key":"9686_CR79","doi-asserted-by":"publisher","DOI":"10.3390\/s22155883","author":"F Ullah","year":"2022","unstructured":"Ullah F, Ullah S, Naeem MR, Mostarda L, Rho S, Cheng X. Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation. Sensors. 2022. https:\/\/doi.org\/10.3390\/s22155883.","journal-title":"Sensors"},{"issue":"3","key":"9686_CR80","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/COMST.2023.3273282","volume":"25","author":"N Sun","year":"2023","unstructured":"Sun N, et al. Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutorials. 2023;25(3):1748\u201374. https:\/\/doi.org\/10.1109\/COMST.2023.3273282.","journal-title":"IEEE Commun Surv Tutorials"},{"key":"9686_CR81","doi-asserted-by":"publisher","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","volume":"12","author":"MA Ferrag","year":"2024","unstructured":"Ferrag MA, et al. Revolutionizing cyber threat detection with large Language models: A Privacy-Preserving BERT-Based lightweight model for iot\/iiot devices. IEEE Access. 2024;12:23733\u201350. https:\/\/doi.org\/10.1109\/ACCESS.2024.3363469.","journal-title":"IEEE Access"},{"key":"9686_CR82","doi-asserted-by":"publisher","first-page":"194","DOI":"10.3233\/SHTI220436","volume":"294","author":"K Narmadha","year":"2022","unstructured":"Narmadha K, Varalakshmi P. Federated learning in healthcare: A privacy preserving approach. Stud Health Technol Inf. 2022;294:194\u20138. https:\/\/doi.org\/10.3233\/SHTI220436.","journal-title":"Stud Health Technol Inf"},{"issue":"10","key":"9686_CR83","doi-asserted-by":"publisher","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","volume":"17","author":"G Sun","year":"2021","unstructured":"Sun G, Xu Z, Yu H, Chang V. Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Ind Inf. 2021;17(10):7155\u201364. https:\/\/doi.org\/10.1109\/TII.2020.3042872.","journal-title":"IEEE Trans Ind Inf"},{"key":"9686_CR84","doi-asserted-by":"publisher","unstructured":"Papakostas G, Shakya S, Kamel AK. Mobile Computing and Sustainable Informatics, in Proceedings of ICMCSI 2023, 2023. https:\/\/doi.org\/10.1007\/978-981-99-0835-6","DOI":"10.1007\/978-981-99-0835-6"},{"issue":"1","key":"9686_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12910-022-00872-y","volume":"23","author":"G Lorenzini","year":"2022","unstructured":"Lorenzini G, Shaw DM, Elger BS. It takes a pirate to know one: ethical hackers for healthcare cybersecurity. BMC Med Ethics. 2022;23(1):1\u20138. https:\/\/doi.org\/10.1186\/s12910-022-00872-y.","journal-title":"BMC Med Ethics"},{"key":"9686_CR86","doi-asserted-by":"crossref","unstructured":"Shavazipour A, Jan H, Multi-scenario K, Shavazipour B, Kwakkel JH, Miettinen K. Cyber security in healthcare systems, vol. 144, no. 2. 2021.","DOI":"10.1016\/j.envsoft.2021.105134"},{"key":"9686_CR87","doi-asserted-by":"crossref","unstructured":"Zarrin J. Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Comput, 8, 2021.","DOI":"10.1007\/s10586-021-03301-8"},{"key":"9686_CR88","doi-asserted-by":"publisher","unstructured":"Kissi J, et al. Healthcare professionals\u2019 perception on emergence of security threat using digital health technologies in healthcare delivery. Digit Health. 2024;10. https:\/\/doi.org\/10.1177\/20552076241260385.","DOI":"10.1177\/20552076241260385"},{"key":"9686_CR89","unstructured":"Abad G, Picek S, Ram\u00edrez-Dur\u00e1n VJ, Urbieta A. On the Security & Privacy in Federated Learning, arXiv:2112.05423v2 [cs.CR], 2022."},{"issue":"2","key":"9686_CR90","doi-asserted-by":"publisher","first-page":"377","DOI":"10.3233\/IDT-220132","volume":"17","author":"TBM Krishna","year":"2023","unstructured":"Krishna TBM, Praveen SP, Ahmed S, Srinivasu PN. Software-driven secure framework for mobile healthcare applications in IoMT. Intell Decis Technol. 2023;17(2):377\u201393. https:\/\/doi.org\/10.3233\/IDT-220132.","journal-title":"Intell Decis Technol"},{"key":"9686_CR91","doi-asserted-by":"publisher","first-page":"83537","DOI":"10.1109\/ACCESS.2023.3303113","volume":"11","author":"MA Elsadig","year":"2023","unstructured":"Elsadig MA. Detection of Denial-of-Service attack in wireless sensor networks: A lightweight machine learning approach. IEEE Access. 2023;11:83537\u201352. https:\/\/doi.org\/10.1109\/ACCESS.2023.3303113.","journal-title":"IEEE Access"},{"key":"9686_CR92","doi-asserted-by":"publisher","unstructured":"Kharb L, Chahal D. ICICCT 2017, in Proceedings of International Conference on: Information, Communication and Computing Technology, New Delhi, India: Edupedia Publications Pvt Ltd, New Delhi, 2017, pp. 1\u2013191. https:\/\/doi.org\/10.1007\/978-981-10-2750-5","DOI":"10.1007\/978-981-10-2750-5"},{"key":"9686_CR93","doi-asserted-by":"publisher","unstructured":"CP B. Analysis of white and black hat hacker roles, practices and techniques, considering ethical and legal issues, including bug bounty programs. SunText Rev Econ Bus. 2023;04(04). https:\/\/doi.org\/10.51737\/2766-4775.2023.095.","DOI":"10.51737\/2766-4775.2023.095"},{"key":"9686_CR94","unstructured":"Araque ED. Active cyber defense in the healthcare sector. Clark University; 2023."},{"key":"9686_CR95","doi-asserted-by":"publisher","unstructured":"Mathew DE, Ebem DU, Chukwu A, Pamela I, Ukeoma E, Dibiaezue NF. Recent emerging techniques in explainable artificial intelligence to enhance the interpretable and Understanding of AI models for human. Volume 123. Springer US; 2025. https:\/\/doi.org\/10.1007\/s11063-025-11732-2.","DOI":"10.1007\/s11063-025-11732-2"},{"key":"9686_CR96","doi-asserted-by":"publisher","unstructured":"Shaukat K, Luo S, Chen S, Liu D. Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective, in 1st Annual International Conference on Cyber Warfare and Security, ICCWS 2020 - Proceedings, 2020, pp. 1\u201315. https:\/\/doi.org\/10.1109\/ICCWS48432.2020.9292388","DOI":"10.1109\/ICCWS48432.2020.9292388"},{"issue":"8","key":"9686_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info13080392","volume":"13","author":"PK Yeng","year":"2022","unstructured":"Yeng PK, Fauzi MA, Yang B, Nimbe P. Investigation into phishing risk behaviour among healthcare staff. Inform (Switzerland). 2022;13(8):1\u201330. https:\/\/doi.org\/10.3390\/info13080392.","journal-title":"Inform (Switzerland)"},{"issue":"1","key":"9686_CR98","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00287-9","volume":"7","author":"J Dafoe","year":"2024","unstructured":"Dafoe J, Chen N, Chen B, Wang Z. Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction. Cybersecurity. 2024;7(1): 75. https:\/\/doi.org\/10.1186\/s42400-024-00287-9.","journal-title":"Cybersecurity"},{"issue":"5","key":"9686_CR99","doi-asserted-by":"publisher","first-page":"e2312270","DOI":"10.1001\/jamanetworkopen.2023.12270","volume":"6","author":"C Dameff","year":"2023","unstructured":"Dameff C, et al. Ransomware attack associated with disruptions at adjacent emergency departments in the US. JAMA Netw Open. 2023;6(5):e2312270. https:\/\/doi.org\/10.1001\/jamanetworkopen.2023.12270.","journal-title":"JAMA Netw Open"},{"key":"9686_CR100","doi-asserted-by":"publisher","DOI":"10.1001\/jamahealthforum.2022.4873","author":"HT Neprash","year":"2022","unstructured":"Neprash HT, et al. Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016\u20132021. JAMA Health Forum. 2022. https:\/\/doi.org\/10.1001\/jamahealthforum.2022.4873.","journal-title":"JAMA Health Forum"},{"key":"9686_CR101","unstructured":"Bob S. The Cost of Data Breaches in Mobile Healthcare, Ponemon Institute. [Online]. Available: https:\/\/www.proofpoint.com\/us\/cyber-insecurity-in-healthcare"},{"key":"9686_CR102","unstructured":"Aspach K. 10 Major Cyberattacks And Data Breaches In 2024 (So Far), vol. 2024, 2024."},{"issue":"3","key":"9686_CR103","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.32604\/IASC.2022.023460","volume":"32","author":"AH Almulihi","year":"2022","unstructured":"Almulihi AH, Alassery F, Khan AI, Shukla S, Gupta BK, Kumar R. Analyzing the implications of healthcare data breaches through computational technique. Intell Autom Soft Comput. 2022;32(3):1763\u201379. https:\/\/doi.org\/10.32604\/IASC.2022.023460.","journal-title":"Intell Autom Soft Comput"},{"issue":"4","key":"9686_CR104","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/s12525-021-00490-3","volume":"31","author":"K Masuch","year":"2021","unstructured":"Masuch K, Greve M, Trang S. What to do after a data breach? Examining apology and compensation as response strategies for health service providers. Electron Markets. 2021;31(4):829\u201348. https:\/\/doi.org\/10.1007\/s12525-021-00490-3.","journal-title":"Electron Markets"},{"key":"9686_CR105","doi-asserted-by":"publisher","unstructured":"Khatiwada P, Fauzi MA, Yang B, Yeng P, Lin JC, Sun L. Threats and Risk on Using Digital Technologies for Remote Health Care Process, in ACM International Conference Proceeding Series, 2023, pp. 506\u2013522. https:\/\/doi.org\/10.1145\/3626641.3627604","DOI":"10.1145\/3626641.3627604"},{"key":"9686_CR106","doi-asserted-by":"publisher","unstructured":"Moura P, Fazendeiro P, In\u00e1cio PRM, Vieira-Marques P, Ferreira A. Assessing access control risk for mHealth: A Delphi study to categorize security of health data and provide risk assessment for mobile apps. J Healthc Eng. 2020;2020. https:\/\/doi.org\/10.1155\/2020\/5601068.","DOI":"10.1155\/2020\/5601068"},{"issue":"24","key":"9686_CR107","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20247182","volume":"20","author":"M Asad","year":"2020","unstructured":"Asad M, Moustafa A, Yu C. A critical evaluation of privacy and security threats in federated learning. Sens (Switzerland). 2020;20(24):1\u201315. https:\/\/doi.org\/10.3390\/s20247182.","journal-title":"Sens (Switzerland)"},{"issue":"2","key":"9686_CR108","doi-asserted-by":"publisher","first-page":"93","DOI":"10.5281\/zenodo.10206563","volume":"1","author":"DAS George","year":"2023","unstructured":"George DAS, George ASH. The emergence of cybersecurity medicine: protecting implanted devices from cyber threats. Partners Univers Innovative Res Publication. 2023;1(2):93\u2013111. https:\/\/doi.org\/10.5281\/zenodo.10206563.","journal-title":"Partners Univers Innovative Res Publication"},{"key":"9686_CR109","doi-asserted-by":"publisher","unstructured":"Pool J, Akhlaghpour S, Fatehi F. Towards a contextual theory of mobile health data protection (MHDP): A realist perspective. Int J Med Inf. 2020;141. https:\/\/doi.org\/10.1016\/j.ijmedinf.2020.104229.","DOI":"10.1016\/j.ijmedinf.2020.104229"},{"key":"9686_CR110","unstructured":"National Institute of Standards and Technology. Mobile Device Security: Corporate-Owned Personally-Enabled (COPE), NIST Publishes SP 1800-21. [Online]. Available: https:\/\/csrc.nist.gov"},{"key":"9686_CR111","unstructured":"National Institute of Standards and Technology. NIST Special Publication 800\u2013\u200957: Recommendation for Key Management, 2022."},{"key":"9686_CR112","doi-asserted-by":"publisher","first-page":"205071","DOI":"10.1109\/ACCESS.2020.3037474","volume":"8","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Shamim HM, Islam MS, Alrajeh NA, Muhammad G. Secure and provenance enhanced internet of health things framework: A blockchain managed federated learning approach. IEEE Access. 2020;8:205071\u201387. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037474.","journal-title":"IEEE Access"},{"key":"9686_CR113","unstructured":"Open Web Application Security Project. OWASP Mobile Security Testing Guide, OWASP. [Online]. Available: https:\/\/owasp.org\/"},{"key":"9686_CR114","unstructured":"International Organization for Standardization. ISO\/IEC 27001: Information Security Management, ISO. [Online]. Available: https:\/\/www.iso.org"},{"issue":"1","key":"9686_CR115","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1038\/s41598-024-84691-8","volume":"15","author":"J Maruthupandi","year":"2025","unstructured":"Maruthupandi J, Sivakumar S, Dhevi BL, Prasanna S, Priya RK, Selvarajan S. An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security. Sci Rep. 2025;15(1):1363. https:\/\/doi.org\/10.1038\/s41598-024-84691-8.","journal-title":"Sci Rep"},{"key":"9686_CR116","unstructured":"Cybersecurity and Infrastructure Agency. Cybersecurity awareness month. Secure our World, pp. 8\u201310, 2024."},{"key":"9686_CR117","unstructured":"National Cyber Security Centre. Guidance for secure use of mobile applications, NCSC."},{"key":"9686_CR118","unstructured":"Federal Trade Commission. Mobile app privacy and security guidance. FTC, pp. 1\u201315, 2023."},{"key":"9686_CR119","doi-asserted-by":"publisher","unstructured":"Aljedaani B, Ahmad A, Zahedi M, Ali Babar M. Security awareness of end-users of mobile health applications: An empirical study, ACM International Conference Proceeding Series, pp. 125\u2013136, 2020, https:\/\/doi.org\/10.1145\/3448891.3448952","DOI":"10.1145\/3448891.3448952"},{"key":"9686_CR120","doi-asserted-by":"crossref","unstructured":"Tadayon M, Pottie G. Predicting student performance in an educational game using a hidden Markov model. IEEE Trans Educ, pp. 1\u20136, 2020.","DOI":"10.1109\/TE.2020.2984900"},{"key":"9686_CR121","doi-asserted-by":"crossref","unstructured":"Wang Q, Jiang Q, Yang Y, Pan J. The burden of travel for care and its influencing factors in China: an inpatient-based study of travel time. J Transp Health. 2022; 25: 101353. 2022.","DOI":"10.1016\/j.jth.2022.101353"},{"key":"9686_CR122","unstructured":"SANS Institute. Vulnerability assessment essentials for modern applications. SANSI, 2023."},{"key":"9686_CR123","unstructured":"GDPR. General Data Protection Regulation (GDPR): Guidelines for Compliance, 2022."},{"key":"9686_CR124","unstructured":"Zakes A. 2023 HIMSS Healthcare Cybersecurity Survey, 2023."},{"key":"9686_CR125","unstructured":"Klaudia B. A New Era of Healthcare: Telehealth vs. Telemedicine Explained, Healthnews. [Online]. Available: https:\/\/healthnews.com\/family-health\/healthy-living\/telehealth-vs-telemedicine-differences\/#:~:text=Telehealth isn%27t just about doctor-patient chats%3B it%27s a,diagnoses%2\u00a0C treatments%2\u00a0C and prescriptions \u2014 all delivered remotely."},{"key":"9686_CR126","unstructured":"HIPAA. HIPAA Privacy and Security Rules, 2023."},{"issue":"9","key":"9686_CR127","doi-asserted-by":"publisher","first-page":"2486","DOI":"10.3906\/elk-2102-89","volume":"25","author":"M Koca","year":"2021","unstructured":"Koca M, Aydin MA, Sertba\u015f A, Za\u0130m AH. A new distributed anomaly detection approach for log IDS management based on deep learning. Turkish J Electr Eng Comput Sci. 2021;25(9):2486\u2013501. https:\/\/doi.org\/10.3906\/elk-2102-89.","journal-title":"Turkish J Electr Eng Comput Sci"},{"key":"9686_CR128","doi-asserted-by":"publisher","unstructured":"Kostiantyn Z. Cyber Hygiene in the Context of Digital Transformation in Higher Education: Challenges and Opportunities, in International Scientific and Practical Conference Problems of Students in Universities and New Ways of Solving them, Paris, France: International Sceince Group, 2025. https:\/\/doi.org\/10.46299\/ISG.2025.1.5","DOI":"10.46299\/ISG.2025.1.5"},{"issue":"1","key":"9686_CR129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.34218\/IJARET_16_01_001","volume":"16","author":"A Khanna","year":"2025","unstructured":"Khanna A. Implementing effective cyber hygiene practices. Int J Adv Res Eng Technol. 2025;16(1):1\u20139. https:\/\/doi.org\/10.34218\/IJARET_16_01_001.","journal-title":"Int J Adv Res Eng Technol"},{"issue":"10","key":"9686_CR130","doi-asserted-by":"publisher","first-page":"2506","DOI":"10.1109\/TIFS.2018.2821095","volume":"13","author":"X Sun","year":"2018","unstructured":"Sun X, Dai J, Liu P, Singhal A, Yen J. Using bayesian networks for probabilistic identification of Zero-Day attack paths. IEEE Trans Inf Forensics Secur. 2018;13(10):2506\u201321. https:\/\/doi.org\/10.1109\/TIFS.2018.2821095.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9686_CR131","doi-asserted-by":"publisher","unstructured":"Koca M. Real-Time Security Risk Assessment From CCTV Using Hand Gesture Recognition, in IEEE Access, vol. 12, pp. 84548\u201384555, 2024, https:\/\/doi.org\/10.1109\/ACCESS.2024.3412930","DOI":"10.1109\/ACCESS.2024.3412930"},{"key":"9686_CR132","unstructured":"Enamamu TS, Otebolaku AM, Dany J, Marchang JN. Continuous m-Health Monitoring and Patient Verification Using Bioelectrical Signals, Preprints (Basel), pp. 1\u201318, 2020."},{"key":"9686_CR133","unstructured":"Kumar H, Sarma D, Borah S, Dutta N, Conference N. Advances in Communication, Cloud, and Big Data. Singapore: Springer Nature Singapore Pte Ltd., 2016."},{"key":"9686_CR134","doi-asserted-by":"publisher","first-page":"104155","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou W, Xia C, Wang T, Liang X, Lin W, Li X, Zhang S. Hidim: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. Computers Secur. 2025;148:104155.","journal-title":"Computers Secur"},{"issue":"2","key":"9686_CR135","doi-asserted-by":"publisher","first-page":"220","DOI":"10.18178\/ijiet.2025.15.2.2235","volume":"15","author":"HD Surdjono","year":"2025","unstructured":"Surdjono HD, et al. Effectiveness of cybersecurity awareness program based on mobile learning to improve cyber hygiene. Int J Inf Educ Technol. 2025;15(2):220\u20139. https:\/\/doi.org\/10.18178\/ijiet.2025.15.2.2235.","journal-title":"Int J Inf Educ Technol"},{"key":"9686_CR136","first-page":"202","volume":"10","author":"SL Priyadharshini","year":"2024","unstructured":"Priyadharshini SL, et al. Unlocking cybersecurity value through advance technology and analytics from data to insight. Nanotechnol Percept. 2024;10:202\u201318.","journal-title":"Nanotechnol Percept"},{"issue":"1","key":"9686_CR137","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10207-023-00748-1","volume":"23","author":"OBJ Rabie","year":"2024","unstructured":"Rabie OBJ, Selvarajan S, Hasanin T, Mohammed GB, Alshareef AM, Uddin M. A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int J Inf Secur. 2024;23(1):51\u201380. https:\/\/doi.org\/10.1007\/s10207-023-00748-1.","journal-title":"Int J Inf Secur"},{"issue":"3","key":"9686_CR138","doi-asserted-by":"publisher","first-page":"517","DOI":"10.13052\/jcsm2245-1439.1338","volume":"13","author":"J Li","year":"2024","unstructured":"Li J. Attribute based signature encryption scheme based on cloud computing in medical social networks. J Cyber Secur Mobil. 2024;13(3):517\u201340. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1338.","journal-title":"J Cyber Secur Mobil"},{"key":"9686_CR139","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1109\/TRO.2024.3351556","volume":"40","author":"S Bajaj","year":"2024","unstructured":"Bajaj S, Bopardikar SD, Torng E, Von Moll A, Casbeer DW. Multivehicle perimeter defense in conical environments. IEEE Trans Robot. 2024;40:1439\u201356. https:\/\/doi.org\/10.1109\/TRO.2024.3351556.","journal-title":"IEEE Trans Robot"},{"key":"9686_CR140","doi-asserted-by":"crossref","unstructured":"Bromiley M. 2022 SANS Protects: The Endpoint, SANS Institute, no. April, pp. 1\u201310, 2022.","DOI":"10.28937\/9783862596539_1"},{"key":"9686_CR141","unstructured":"Vegesna VV. Enhancing cyber resilience by integrating AI-Driven threat detection and mitigation strategies. Trans Latest Trends Artif Intell, 4, 4, 2023."},{"key":"9686_CR142","doi-asserted-by":"publisher","unstructured":"Long G, Shen T, Tan Y, Gerrard L, Clarke A, Jiang J. Federated learning for Privacy-Preserving open innovation future on digital health. Humanity Driven AI. 2022;113\u201333. https:\/\/doi.org\/10.1007\/978-3-030-72188-6_6.","DOI":"10.1007\/978-3-030-72188-6_6"},{"key":"9686_CR143","doi-asserted-by":"publisher","unstructured":"Zhang F, et al. Recent methodological advances in federated learning for healthcare. Patterns. 2024;5(6). https:\/\/doi.org\/10.1016\/j.patter.2024.101006.","DOI":"10.1016\/j.patter.2024.101006"},{"key":"9686_CR144","doi-asserted-by":"publisher","unstructured":"Ibrahim M, Al-Wadi A, Elhafiz R. Security analysis for smart healthcare systems. Sensors. 2024;24(11). https:\/\/doi.org\/10.3390\/s24113375.","DOI":"10.3390\/s24113375"},{"issue":"1","key":"9686_CR145","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1038\/s41598-025-85866-7","volume":"15","author":"U Ahmed","year":"2025","unstructured":"Ahmed U, et al. Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Sci Rep. 2025;15(1):1726. https:\/\/doi.org\/10.1038\/s41598-025-85866-7.","journal-title":"Sci Rep"},{"key":"9686_CR146","doi-asserted-by":"publisher","unstructured":"Xia T, Han J, Ghosh A, Mascolo C. Cross-Device Federated Learning for Mobile Health Diagnostics: A First Study on COVID-19 Detection, in ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2023. https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10096427","DOI":"10.1109\/ICASSP49357.2023.10096427"},{"key":"9686_CR147","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li L, Fan Y, Tse M, Lin K-Y. A review of applications in federated learning. Comput Ind Eng. 2020;149:1\u20132. https:\/\/doi.org\/10.1016\/j.cie.2020.106854.","journal-title":"Comput Ind Eng"},{"issue":"1","key":"9686_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01161-7","volume":"20","author":"ST Argaw","year":"2020","unstructured":"Argaw ST, et al. Cybersecurity of hospitals: discussing the challenges and working towards mitigating the risks. Med Inf Decis Mak. 2020;20(1):1\u201310. https:\/\/doi.org\/10.1186\/s12911-020-01161-7.","journal-title":"Med Inf Decis Mak"},{"key":"9686_CR149","doi-asserted-by":"publisher","unstructured":"Yaqoob MM, Nazir M, Khan MA, Qureshi S, Al-Rasheed A. Hybrid Classifier-Based federated learning in health service providers for cardiovascular disease prediction. Appl Sci (Switzerland). 2023;13(3). https:\/\/doi.org\/10.3390\/app13031911.","DOI":"10.3390\/app13031911"},{"key":"9686_CR150","doi-asserted-by":"publisher","unstructured":"Kumar A, et al. A novel decentralized blockchain architecture for the preservation of privacy and data security against cyberattacks in healthcare. Sensors. 2022;22(15). https:\/\/doi.org\/10.3390\/s22155921.","DOI":"10.3390\/s22155921"},{"issue":"01","key":"9686_CR151","doi-asserted-by":"publisher","first-page":"368","DOI":"10.30574\/msarr.2024.10.1.0028","volume":"10","author":"UJ Umoga","year":"2024","unstructured":"Umoga UJ, et al. Exploring the potential of AI-driven optimization in enhancing network performance and efficiency. Magna Scientia Adv Res Reviews. 2024;10(01):368\u201378.","journal-title":"Magna Scientia Adv Res Reviews"},{"issue":"1","key":"9686_CR152","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3233\/SW-160226","volume":"8","author":"N Bikakis","year":"2017","unstructured":"Bikakis N, Papastefanatos G, Skourla M, Sellis T. A hierarchical aggregation framework for efficient multilevel visual exploration and analysis. Semant Web. 2017;8(1):139\u201379. https:\/\/doi.org\/10.3233\/SW-160226.","journal-title":"Semant Web"},{"issue":"1","key":"9686_CR153","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3991\/ijim.v17i01.35131","volume":"17","author":"N Tabassum","year":"2023","unstructured":"Tabassum N, Ahmed M, Shorna NJ, Sowad MMUR, Haque HMZ. Depression detection through smartphone sensing: A federated learning approach. Int J Interact Mob Technol. 2023;17(1):40\u201356. https:\/\/doi.org\/10.3991\/ijim.v17i01.35131.","journal-title":"Int J Interact Mob Technol"},{"key":"9686_CR154","unstructured":"Olaoye F, Egon A. Federated learning for Privacy-Preserving security analytics. EasyChair, 2024."},{"issue":"6","key":"9686_CR155","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s23063004","volume":"23","author":"SP Menon","year":"2023","unstructured":"Menon SP, et al. An intelligent diabetic patient tracking system based on machine learning for E-Health applications. Sensors. 2023;23(6):1\u201314. https:\/\/doi.org\/10.3390\/s23063004.","journal-title":"Sensors"},{"key":"9686_CR156","doi-asserted-by":"publisher","unstructured":"McGowan A, Sittig S, Andel T. Medical internet of things: A survey of the current threat and vulnerability landscape, in Proceedings of the Annual Hawaii International Conference on System Sciences, 2021, pp. 3850\u20133858. https:\/\/doi.org\/10.24251\/hicss.2021.466","DOI":"10.24251\/hicss.2021.466"},{"key":"9686_CR157","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2196\/43006","volume":"25","author":"T Wang","year":"2023","unstructured":"Wang T, Du Y, Gong Y, Raymond KK, Choo, Guo Y. Applications of federated learning in mobile health: scoping review. J Med Internet Res. 2023;25:1\u201312. https:\/\/doi.org\/10.2196\/43006.","journal-title":"J Med Internet Res"},{"key":"9686_CR158","unstructured":"Garg A, Saha AK, Dutta D. Federated Neural Architecture Search, arXiv:2002.06352v5 [cs.LG], vol. 5, 2022."},{"issue":"1","key":"9686_CR159","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/3489048.3526953","volume":"50","author":"M Zhang","year":"2022","unstructured":"Zhang M, Wei E, Berry R, Huang J. Age-Dependent differential privacy. Perform Eval Rev. 2022;50(1):115\u20136. https:\/\/doi.org\/10.1145\/3489048.3526953.","journal-title":"Perform Eval Rev"},{"key":"9686_CR160","doi-asserted-by":"publisher","unstructured":"\u0130, Avc\u0131, Koca M. Intelligent transportation system technologies, challenges and security. Appl Sci. 2024;14(11). https:\/\/doi.org\/10.3390\/app14114646.","DOI":"10.3390\/app14114646"},{"issue":"1","key":"9686_CR161","doi-asserted-by":"publisher","first-page":"30","DOI":"10.37256\/aie.6120256065","volume":"6","author":"AC Ikegwu","year":"2025","unstructured":"Ikegwu AC, Obianuju OJ, Nwokoro IS, Ofuru M, Ebem DU. Investigating the impact of AI\/ML for monitoring and optimizing energy usage in smart home. Artif Intell Evol. 2025;6(1):30\u201343. https:\/\/doi.org\/10.37256\/aie.6120256065.","journal-title":"Artif Intell Evol"},{"key":"9686_CR162","doi-asserted-by":"publisher","first-page":"111023","DOI":"10.1016\/j.comnet.2024.111023","volume":"258","author":"A Belenguer","year":"2025","unstructured":"Belenguer A, Navaridas J, Pascual JA. A review of federated learning in intrusion detection systems for IoT. Comput Netw. 2025;258:111023. https:\/\/doi.org\/10.1016\/j.comnet.2024.111023.","journal-title":"Comput Netw"},{"key":"9686_CR163","doi-asserted-by":"publisher","unstructured":"Cheng Z et al. Kairos: practical intrusion detection and investigation using Whole-system provenance, 2024. https:\/\/doi.org\/10.1109\/sp54263.2024.00005","DOI":"10.1109\/sp54263.2024.00005"},{"issue":"5","key":"9686_CR164","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/TII.2021.3119038","volume":"18","author":"M Alazab","year":"2022","unstructured":"Alazab M, Rm SP, Parimala M, Maddikunta PKR, Gadekallu TR, Pham QV. Federated learning for cybersecurity: concepts, challenges, and future directions. IEEE Trans Industr Inf. 2022;18(5):3501\u20139. https:\/\/doi.org\/10.1109\/TII.2021.3119038.","journal-title":"IEEE Trans Industr Inf"},{"key":"9686_CR165","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03568-5","author":"AC Ikegwu","year":"2022","unstructured":"Ikegwu AC, Nweke HF, Anikwe CV, Alo UR, Okonkwo OR. Tools, Challenges, Solutions and Research Directions. Cluster Comput. 2022;25(5):3343\u201387. https:\/\/doi.org\/10.1007\/s10586-022-03568-5. Big Data Analytics for Data-driven Industry: A Review of Data Sources,."},{"issue":"1","key":"9686_CR166","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12913-023-09104-4","volume":"23","author":"MN Islam","year":"2023","unstructured":"Islam MN, et al. Predictis: an IoT and machine learning-based system to predict risk level of cardio-vascular diseases. BMC Health Serv Res. 2023;23(1):1\u201325. https:\/\/doi.org\/10.1186\/s12913-023-09104-4.","journal-title":"BMC Health Serv Res"},{"issue":"3","key":"9686_CR167","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor. 2020;22(3):1646\u201385. https:\/\/doi.org\/10.1109\/COMST.2020.2988293.","journal-title":"IEEE Commun Surv Tutor"},{"key":"9686_CR168","doi-asserted-by":"publisher","unstructured":"Koca M, Avci I. A Novel Hybrid Model Detection of Security Vulnerabilities in Industrial Control Systems and IoT Using GCN\u2009+\u2009LSTM, IEEE Access, no. August, pp. 143343\u2013143351, 2024, https:\/\/doi.org\/10.1109\/ACCESS.2024.3466391","DOI":"10.1109\/ACCESS.2024.3466391"},{"key":"9686_CR169","first-page":"1","volume":"3","author":"G Xu","year":"2023","unstructured":"Xu G, et al. AAQ-PEKS: an Attribute-based anti-Quantum Public-Key encryption scheme with keyword search for E-healthcare scenarios. Cryptol ePrint Arch. 2023;3:1\u201313.","journal-title":"Cryptol ePrint Arch"},{"key":"9686_CR170","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app12199901","volume":"12","author":"R Gosselin","year":"2022","unstructured":"Gosselin R, Vieu L, Loukil F, Benoit A. Privacy and security in federated learning: A survey. Appl Sci (Switzerland). 2022;12:1\u201315. https:\/\/doi.org\/10.3390\/app12199901.","journal-title":"Appl Sci (Switzerland)"},{"key":"9686_CR171","unstructured":"Anikwe CV, Nweke HF, Alo UR, Onu UF. Mobile Based Health Monitoring System for the Elderly People using Internet of Medical Things, in ICT4NDS2021: ICT and Sustainability in the 5th Industrial Revolution, 2021, pp. 35\u201340."},{"key":"9686_CR172","doi-asserted-by":"crossref","unstructured":"Zhao X, Zhang Y, Yang Y. and Jay Pan. Diabetes-related avoidable hospitalisations and its relationship with primary healthcare resourcing in china: A cross\u2010sectional study from Sichuan Province. Health Soc Care Commun 30, 4, e1143-e1156, 2022.","DOI":"10.1111\/hsc.13522"},{"key":"9686_CR173","unstructured":"Cybersecurity and Infrastructure Security Agency. Cybersecurity Threats and Best Practices for Healthcare System, CISA."},{"key":"9686_CR174","doi-asserted-by":"crossref","unstructured":"Hu J, Jiang H, Chen S, Zhang Q, Xiao Z, Liu D, Liu J, Li B. Wishield: privacy against wi-fi human tracking. IEEE J Sel Areas Commun, 2024.","DOI":"10.1109\/JSAC.2024.3414597"},{"key":"9686_CR175","doi-asserted-by":"publisher","unstructured":"De Feo L, Leroux A, Longa P, Wesolowski B. New Algorithms for the Deuring Correspondence: Towards Practical and Secure SQISign Signatures, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14008 LNCS, pp. 659\u2013690, 2023, https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"issue":"11","key":"9686_CR176","doi-asserted-by":"publisher","first-page":"8229","DOI":"10.1109\/JIOT.2022.3150363","volume":"9","author":"B Ghimire","year":"2022","unstructured":"Ghimire B, Rawat DB. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J. 2022;9(11):8229\u201349. https:\/\/doi.org\/10.1109\/JIOT.2022.3150363.","journal-title":"IEEE Internet Things J"},{"key":"9686_CR177","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fcteg.2023.1104745","volume":"4","author":"ES Lee","year":"2023","unstructured":"Lee ES, Zhou L, Ribeiro A, Kumar V. Graph neural networks for decentralized multi-agent perimeter defense. Front Control Eng. 2023;4:1\u201312. https:\/\/doi.org\/10.3389\/fcteg.2023.1104745.","journal-title":"Front Control Eng"},{"key":"9686_CR178","doi-asserted-by":"publisher","unstructured":"Adigun GO, Ajani YA, Enakrire RT. The Intelligent Libraries: Innovation for a Sustainable Knowledge System in the Fifth (5th) Industrial Revolution, Libri, vol. 74, no. 3, pp. 211\u2013223, 2024, https:\/\/doi.org\/10.1515\/libri-2023-0111","DOI":"10.1515\/libri-2023-0111"},{"key":"9686_CR179","doi-asserted-by":"publisher","unstructured":"Bajaj S, Bopardikar SD, Von Moll A, Torng E, Casbeer DW. Perimeter Defense Using a Turret with Finite Range and Startup Time, Proceedings of the American Control Conference, vol. 2023-May, pp. 3350\u20133355, 2023, https:\/\/doi.org\/10.23919\/ACC55779.2023.10155838","DOI":"10.23919\/ACC55779.2023.10155838"},{"key":"9686_CR180","unstructured":"ISACA. Third-Party risk management framework for healthcare. ISACA, 2023."},{"key":"9686_CR181","unstructured":"International Organization for Standardization. ISO\/IEC 27701: Privacy Information Management, ISO\/IEC 27701."}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09686-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09686-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09686-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T13:10:54Z","timestamp":1757250654000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09686-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,17]]},"references-count":181,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9686"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09686-z","relation":{"references":[{"id-type":"doi","id":"10.1007\/s10586-022-03568-5","asserted-by":"subject"}]},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,17]]},"assertion":[{"value":"14 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to publication"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent to participate"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical trial number"}}],"article-number":"152"}}