{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:46:53Z","timestamp":1759366013832,"version":"build-2065373602"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07876-6","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T09:15:17Z","timestamp":1759223717000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing IoMT security: an advanced FAHP-based security scoring system for medical devices evaluation"],"prefix":"10.1007","volume":"81","author":[{"given":"Faouzi","family":"Jaidi","sequence":"first","affiliation":[]},{"given":"Sondes","family":"Ksibi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"issue":"4","key":"7876_CR1","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1007\/s11227-023-05657-7","volume":"80","author":"S Shree","year":"2024","unstructured":"Shree S, Zhou C, Barati M (2024) Data protection in internet of medical things using blockchain and secret sharing method. J Supercomput 80(4):5108","journal-title":"J Supercomput"},{"issue":"6","key":"7876_CR2","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.bushor.2021.07.015","volume":"64","author":"S Tarikere","year":"2021","unstructured":"Tarikere S, Donner I, Woods D (2021) Diagnosing a healthcare cybersecurity crisis: the impact of iomt advancements and 5g. Bus Horiz 64(6):799\u2013807","journal-title":"Bus Horiz"},{"issue":"3","key":"7876_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2021.100549","volume":"10","author":"NM Thomasian","year":"2021","unstructured":"Thomasian NM, Adashi EY (2021) Cybersecurity in the internet of medical things. Health Policy Technol 10(3):100549","journal-title":"Health Policy Technol"},{"issue":"1","key":"7876_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10207-024-00923-y","volume":"24","author":"S Ksibi","year":"2025","unstructured":"Ksibi S, Jaidi F, Bouhoula A (2025) Mlra-sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (iomt ). Int J Inf Secur 24(1):21","journal-title":"Int J Inf Secur"},{"issue":"7","key":"7876_CR5","doi-asserted-by":"publisher","first-page":"8639","DOI":"10.1007\/s10586-024-04507-2","volume":"27","author":"L Nemec Zlatolas","year":"2024","unstructured":"Nemec Zlatolas L, Welzer T, Lhotska L (2024) Data breaches in healthcare: security mechanisms for attack mitigation. Clust Comput 27(7):8639\u20138654","journal-title":"Clust Comput"},{"key":"7876_CR6","unstructured":"Alder S (2024) The hipaa journal: March 2024 healthcare data breach report. https:\/\/www.hipaajournal.com\/march-2024-healthcare-data-breach-report\/"},{"key":"7876_CR7","unstructured":"Alder S (2025) The hipaa journal: March 2025 healthcare data breach report. https:\/\/www.hipaajournal.com\/march-2025-healthcare-data-breach-report\/"},{"issue":"1","key":"7876_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11036-022-02042-1","volume":"28","author":"S Ksibi","year":"2023","unstructured":"Ksibi S, Jaidi F, Bouhoula A (2023) A comprehensive study of security and cyber-security risk management within e-health systems: synthesis, analysis and a novel quantified approach. Mob Netw Appl 28(1):107\u2013127","journal-title":"Mob Netw Appl"},{"key":"7876_CR9","doi-asserted-by":"publisher","DOI":"10.6688\/JISE.202411_40(6).0003","author":"S Ksibi","year":"2024","unstructured":"Ksibi S, Jaidi F, Bouhoula A (2024) Securing iomt applications: an approach for enhancing the reliability of security policies within cloud databases. J Inf Sci Eng. https:\/\/doi.org\/10.6688\/JISE.202411_40(6).0003","journal-title":"J Inf Sci Eng"},{"key":"7876_CR10","doi-asserted-by":"publisher","DOI":"10.2196\/44114","volume":"25","author":"T Suleski","year":"2023","unstructured":"Suleski T, Ahmed M (2023) A data taxonomy for adaptive multifactor authentication in the internet of health care things. J Med Internet Res 25:e44114","journal-title":"J Med Internet Res"},{"issue":"16","key":"7876_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e36269","volume":"10","author":"S Saif","year":"2024","unstructured":"Saif S, Das P, Biswas S, Khan S, Haq MA, Kovtun V (2024) A secure data transmission framework for iot enabled healthcare. Heliyon 10(16):e36269","journal-title":"Heliyon"},{"issue":"4","key":"7876_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10462-024-11101-w","volume":"58","author":"A Naghib","year":"2025","unstructured":"Naghib A, Gharehchopogh FS, Zamanifar A (2025) A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities. Artif Intell Rev 58(4):114","journal-title":"Artif Intell Rev"},{"key":"7876_CR13","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1016\/j.procs.2019.11.238","volume":"161","author":"H Zakaria","year":"2019","unstructured":"Zakaria H, Bakar NAA, Hassan NH, Yaacob S (2019) Iot security risk management model for secured practice in healthcare environment. Procedia Comput Sci 161:1241\u20131248","journal-title":"Procedia Comput Sci"},{"key":"7876_CR14","doi-asserted-by":"crossref","unstructured":"Ksibi S, Jaidi F, Bouhoula A (2022) A user-centric fuzzy ahp-based method for medical devices security assessment. In: 2022 15th International Conference on Security of Information and Networks (SIN), IEEE, pp. 01\u201307","DOI":"10.1109\/SIN56466.2022.9970530"},{"issue":"4","key":"7876_CR15","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1080\/09720529.2019.1642628","volume":"22","author":"V Malik","year":"2019","unstructured":"Malik V, Singh S (2019) Security risk management in iot environment. J Discret Math Sci Cryptogr 22(4):697\u2013709","journal-title":"J Discret Math Sci Cryptogr"},{"key":"7876_CR16","doi-asserted-by":"crossref","unstructured":"Abie H, Balasingham I (2012) Risk-based adaptive security for smart iot in ehealth. In: Proceedings of the 7th international conference on body area networks, pp. 269\u2013275","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"7876_CR17","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SR Islam","year":"2015","unstructured":"Islam SR, Kwak D, Kabir MH, Hossain M, Kwak K-S (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678\u2013708","journal-title":"IEEE Access"},{"key":"7876_CR18","unstructured":"Hahn W (2022) Cynerio research finds critical medical device risks continue to threaten hospital security and patient safety. https:\/\/www.cynerio.com\/blog\/cynerio-research-finds-critical-medical-device-risks-continue-to-threaten-hospital-security-and-patient-safety"},{"issue":"6","key":"7876_CR19","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s13201-025-02481-7","volume":"15","author":"W Cheng","year":"2025","unstructured":"Cheng W, Hu M, Wu C (2025) Enhancing green building decision-making with a hybrid fuzzy ahp-topsis model for material selection. Appl Water Sci 15(6):129","journal-title":"Appl Water Sci"},{"key":"7876_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpolbul.2025.118023","volume":"216","author":"Y Wang","year":"2025","unstructured":"Wang Y, Li J (2025) Multi-criteria decision-making for green maritime transportation: a hybrid fuzzy ahp-moora approach to reduce marine pollution. Mar Pollut Bull 216:118023","journal-title":"Mar Pollut Bull"},{"issue":"2","key":"7876_CR21","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s00146-024-01904-4","volume":"40","author":"R Kumar","year":"2025","unstructured":"Kumar R, Mishra SK (2025) Assessing the impact of heat vulnerability on urban public spaces using a fuzzy-based unified computational technique. AI Soc 40(2):787\u2013804","journal-title":"AI Soc"},{"key":"7876_CR22","doi-asserted-by":"publisher","first-page":"72694","DOI":"10.1109\/ACCESS.2020.2987941","volume":"8","author":"R Kumar","year":"2020","unstructured":"Kumar R, Baz A, Alhakami H, Alhakami W, Baz M, Agrawal A, Khan RA (2020) A hybrid model of hesitant fuzzy decision-making analysis for estimating usable-security of software. IEEE Access 8:72694\u201372712","journal-title":"IEEE Access"},{"issue":"5","key":"7876_CR23","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.3390\/math11051197","volume":"11","author":"HU Khan","year":"2023","unstructured":"Khan HU, Ali Y, Khan F (2023) A features-based privacy preserving assessment model for authentication of internet of medical things (iomt) devices in healthcare. Mathematics 11(5):1197","journal-title":"Mathematics"},{"issue":"1","key":"7876_CR24","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/s43093-023-00185-5","volume":"9","author":"AA Al Mohamed","year":"2023","unstructured":"Al Mohamed AA, Al Mohamed S, Zino M (2023) Application of fuzzy multicriteria decision-making model in selecting pandemic hospital site. Future Bus J 9(1):14","journal-title":"Future Bus J"},{"key":"7876_CR25","doi-asserted-by":"crossref","unstructured":"Molloy I, Dickens L, Morisset C, Cheng P-C, Lobo J (2012) A. Russo, Risk-based security decisions under uncertainty. In: Proceedings of the second ACM conference on Data and Application Security and Privacy, pp. 157\u2013168","DOI":"10.1145\/2133601.2133622"},{"issue":"3","key":"7876_CR26","doi-asserted-by":"publisher","first-page":"752","DOI":"10.3390\/su11030752","volume":"11","author":"Y Liu","year":"2019","unstructured":"Liu Y, Yang Y, Liu Y, Tzeng G-H (2019) Improving sustainable mobile health care promotion: a novel hybrid mcdm method. Sustainability 11(3):752","journal-title":"Sustainability"},{"issue":"16","key":"7876_CR27","doi-asserted-by":"publisher","first-page":"8148","DOI":"10.3390\/app12168148","volume":"12","author":"FA Alzahrani","year":"2022","unstructured":"Alzahrani FA, Ahmad M, Ansari MTJ (2022) Towards design and development of security assessment framework for internet of medical things. Appl Sci 12(16):8148","journal-title":"Appl Sci"},{"issue":"10","key":"7876_CR28","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.3390\/s24103223","volume":"24","author":"B Pritika","year":"2024","unstructured":"Pritika B, Shanmugam S (2024) Azam, risk evaluation and attack detection in heterogeneous iomt devices using hybrid fuzzy logic analytical approach. Sensors 24(10):3223","journal-title":"Sensors"},{"issue":"1","key":"7876_CR29","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3846\/20294913.2014.892037","volume":"20","author":"EK Zavadskas","year":"2014","unstructured":"Zavadskas EK, Turskis Z, Kildien\u0117 S (2014) State of art surveys of overviews on mcdm\/madm methods. Technol Econ Dev Econ 20(1):165\u2013179","journal-title":"Technol Econ Dev Econ"},{"issue":"1","key":"7876_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.31181\/dma1120237","volume":"1","author":"SK Sahoo","year":"2023","unstructured":"Sahoo SK, Goswami SS (2023) A comprehensive review of multiple criteria decision-making (mcdm) methods: advancements, applications, and future directions. Decis Mak Adv 1(1):25\u201348","journal-title":"Decis Mak Adv"},{"issue":"3\u20135","key":"7876_CR31","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/0270-0255(87)90473-8","volume":"9","author":"RW Saaty","year":"1987","unstructured":"Saaty RW (1987) The analytic hierarchy process\u2014what it is and how it is used. Math Model 9(3\u20135):161\u2013176","journal-title":"Math Model"},{"issue":"3","key":"7876_CR32","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353","journal-title":"Inf Control"},{"issue":"4","key":"7876_CR33","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1080\/18756891.2015.1046325","volume":"8","author":"C Kahraman","year":"2015","unstructured":"Kahraman C, Onar SC, Oztaysi B (2015) Fuzzy multicriteria decision-making: a literature review. Int J Comput Intell Syst 8(4):637\u2013666","journal-title":"Int J Comput Intell Syst"},{"issue":"3","key":"7876_CR34","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/0377-2217(95)00300-2","volume":"95","author":"D-Y Chang","year":"1996","unstructured":"Chang D-Y (1996) Applications of the extent analysis method on fuzzy ahp. Eur J Oper Res 95(3):649\u2013655","journal-title":"Eur J Oper Res"},{"issue":"3","key":"7876_CR35","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0165-0114(85)90090-9","volume":"17","author":"JJ Buckley","year":"1985","unstructured":"Buckley JJ (1985) Fuzzy hierarchical analysis. Fuzzy Sets Syst 17(3):233\u2013247","journal-title":"Fuzzy Sets Syst"},{"issue":"7","key":"7876_CR36","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1080\/07408170304355","volume":"35","author":"C-K Kwong","year":"2003","unstructured":"Kwong C-K, Bai H (2003) Determining the importance weights for the customer requirements in qfd using a fuzzy ahp with an extent analysis approach. IIE Trans 35(7):619\u2013626","journal-title":"IIE Trans"},{"key":"7876_CR37","doi-asserted-by":"crossref","unstructured":"Ksibi S, Jaidi F, Bouhoula A (2021) Cyber-risk management within iomt: A context-aware agent-based framework for a reliable e-health system. In: The 23rd International Conference on Information Integration and Web Intelligence, pp. 547\u2013552","DOI":"10.1145\/3487664.3487805"},{"key":"7876_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100123","volume":"8","author":"F Alsubaei","year":"2019","unstructured":"Alsubaei F, Abuhussein A, Shandilya V, Shiva S (2019) Iomt-saf: internet of medical things security assessment framework. Internet Things 8:100123","journal-title":"Internet Things"},{"issue":"4","key":"7876_CR39","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/COMST.2019.2914094","volume":"21","author":"T Yaqoob","year":"2019","unstructured":"Yaqoob T, Abbas H, Atiquzzaman M (2019) Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices\u2014a review. IEEE Commun Surv Tutor 21(4):3723\u20133768","journal-title":"IEEE Commun Surv Tutor"},{"key":"7876_CR40","unstructured":"CVE (2020) Common vulnerabilities and exposures. https:\/\/cve.mitre.org"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07876-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07876-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07876-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T23:00:23Z","timestamp":1759273223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07876-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":40,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["7876"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07876-6","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"27 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"1393"}}