Buy Threat Intelligence and Cloud Trust Models for Healthcare Security
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Threat Intelligence and Cloud Trust Models for Healthcare Security
Threat Intelligence and Cloud Trust Models for Healthcare Security

Threat Intelligence and Cloud Trust Models for Healthcare Security


     0     
5
4
3
2
1



International Edition


X
About the Book

As healthcare systems utilize cloud technologies to manage patient data, integrating cybersecurity becomes urgent. Threat intelligence and cloud trust models are vital in safeguarding healthcare infrastructures against evolving cyber threats, data breaches, and compliance risks. By using real-time threat detection, risk assessment frameworks, and trust-based access controls, healthcare organizations can enhance their resilience while maintaining confidentiality, integrity, and availability of medical information. Further exploration into the integration of threat intelligence with cloud trust models may create a more secure and trustworthy digital environment for modern healthcare delivery. Threat Intelligence and Cloud Trust Models for Healthcare Security explores the landscape of healthcare systems powered by the Internet of Things (IoT). It examines the emerging security threats targeting healthcare IoT (HIoT) infrastructure and proposes intelligent threat detection frameworks and trust models tailored for secure cloud integration. This book covers topics such as machine learning, data science, and cloud computing, and is a useful resource for medical and healthcare professionals, engineers, academicians, researchers, and data scientists.

About the Author :
Professor Chin-Shiuh Shieh is a distinguished academic and researcher in the field of electronic engineering and computer science, currently serving as a Professor in the Department of Electronic Engineering at National Kaohsiung University of Science and Technology (NKUST), Taiwan. He received his Ph.D. in Computer Science and Engineering from the National Sun Yat-sen University, Taiwan, and has since dedicated his career to pioneering research and teaching in areas including computer networking, wireless communication, information security, computational intelligence, embedded systems, and medical informatics. With a career spanning several decades, Professor Shieh has made significant contributions to both academia and industry. In the past five years alone, he has authored or co-authored 28 journal papers, of which 24 are indexed in SCI (Science Citation Index), and 80 conference papers, encompassing 26 international and 54 domestic conferences. His editorial acumen is evident in his role as editor for two international academic conference proceedings. Professor Shieh has been actively engaged in various research initiatives, participating in 10 Ministry of Science and Technology (MOST) projects, leading five of them. He has also been involved in three Ministry of Education projects, one of which he led, and a campus research project. Furthermore, his strong industry collaboration is reflected in 10 industry-academia cooperation projects, eight of which he led. He has also contributed to one technology transfer authorization. As a recognized figure in the global research community, Professor Shieh is affiliated with four professional societies, and serves as a reviewer for 106 academic journals. He has participated as a committee member for 21 journals and 175 international conferences, underscoring his influence and expertise in his fields of specialization. Among his recent notable publications is the 2024 SCI-indexed paper titled “Open-set recognition in unknown DDoS attacks detection with reciprocal points learning” published in IEEE Access, which highlights his innovative work in cybersecurity and artificial intelligence. He has also played key editorial roles in conferences such as the International Conference on Genetic and Evolutionary Computing (ICGEC) and Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP). His work has earned multiple accolades including Best Paper Awards and Excellent Paper Awards in international conferences. He has co-developed cutting-edge methods in machine learning, optimization algorithms, and adversarial defense mechanisms, particularly in the domain of cybersecurity threats such as DDoS attacks. His academic journey, prolific publication record, leadership in research projects, and commitment to interdisciplinary collaboration have established him as a leading voice in advancing electronic engineering and computing sciences in Taiwan and beyond. Dr. Pawan Kumar Goel is a seasoned academician, researcher, and institutional leader with over two decades of rich experience in the field of Computer Science and Engineering. Presently serving as an Associate Professor in the Department of Computer Science & Engineering at Raj Kumar Goel Institute of Technology, Ghaziabad (affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow), Dr. Goel has made significant contributions to teaching, research, innovation, and academic administration. His academic journey is marked by a relentless pursuit of excellence, supported by strong educational credentials that include a Ph.D. in Computer Science Engineering, M.Tech in Computer Science & Engineering, and an MBA in Human Resource Management. He is also UGC-NET qualified in Computer Science and Applications and has cleared GATE multiple times. He earned his B.Tech in Information Technology with distinction. His impressive academic qualifications are complemented by numerous certifications from premier institutes in cutting-edge fields like AI, Blockchain, Cloud Computing, Cybersecurity, Quantum Computing, and more. Over his professional career, Dr. Goel has held several key academic and administrative positions. Throughout his journey, he has consistently demonstrated leadership in institutional development, curriculum innovation, accreditation processes (NAAC and NBA), and faculty mentoring. Dr. Goel is a prolific writer and editor, having authored and edited numerous books with globally reputed academic publishers such as IGI Global, Bentham Science, and Scientific International Publishing House. Some of his notable titles include Strategies for E-Commerce Data Security, Cloud Computing and IoT Strategies for Industry 5.0 Innovation, and Improving Security, Privacy, and Trust in Cloud Computing. He has authored over 50 book chapters in diverse areas such as AI for mental health, blockchain for social media, AI-based security for communication networks, and ethical considerations in cybersecurity and artificial emotional intelligence. His scholarly work is widely published in Scopus and UGC-indexed journals, and he has presented at leading IEEE international conferences such as IC3SE, ICDT, ICCSP, and AECE. Dr. Goel's research interests are interdisciplinary, encompassing cloud and edge computing, AI and machine learning, cybersecurity, IoT, wireless sensor networks, and blockchain technology. He has also filed several patents, including designs and systems for smart agricultural drones, IoT health monitoring devices, and blockchain-integrated IoT data management systems. His technological innovations reflect his commitment to solving real-world problems through applied research. Dr. Goel has received multiple awards and accolades for his academic and professional excellence. He was honored with the International Achiever Award 2023 for Distinguished Teaching by Gyan Uday Foundation and the Educator of the Year Award 2022 by Namaste India Council of Educators. He has also been recognized for his role in quality assurance and curriculum development by institutions like Quantum University and IIMT Greater Noida. In addition, he has received appreciation for his contributions as a reviewer and advisor at various international conferences and journals. An active contributor to professional and academic communities, Dr. Goel holds memberships in a wide range of reputed organizations including IEEE, ACM, CSI, IAENG, IACSIT, IFERP, CSTA, and SCIEI. He serves as an editorial and review board member for several international journals such as IJRAR, IJCSIS, JITE, and IJSCE. He is also the Institutional Ambassador for IFERP and serves as the Single Point of Contact (SPOC) for Infosys Campus Connect Program, further strengthening academia-industry collaboration. As a committed educator and academic facilitator, Dr. Goel has organized and coordinated several faculty development programs (FDPs), seminars, and workshops. He has played key roles in AICTE-sponsored FDPs, including being the Co-Coordinator of the ATAL FDP on Quantum Machine Learning in January 2025. He also serves as the Local Coordinator for the Remote Center of NITTTR Chandigarh, enabling the conduction of numerous FDPs and STCs through ICT mode. His organizational acumen and passion for innovation have enabled the successful execution of national-level events and knowledge dissemination platforms. Dr. Goel continues to actively participate in continuous learning and professional development, having completed numerous AICTE-ATAL FDPs in areas such as Cybersecurity in AI, Deep Learning, Quantum Computing, and Ethical AI. He has also successfully completed various NPTEL MOOCs on subjects including Blockchain Architecture, Data Science, Privacy and Security in Online Social Media, and NBA Accreditation processes. An enthusiastic academic with a strong foundation in pedagogy and research, Dr. Goel teaches core computer science courses such as Programming in C, Data Structures, Computer Networks, Database Management Systems, Cloud Computing, and Cybersecurity. His teaching philosophy emphasizes conceptual clarity, problem-solving, and the integration of emerging technologies into the curriculum. Dr. Goel’s personal qualities—leadership, optimism, perseverance, and hard work—have earned him admiration among his peers and students alike. His multifaceted contributions to academia, research, and innovation position him as a thought leader and change-maker in the Indian higher education landscape. He continues to inspire generations of learners and researchers, contributing significantly to the digital and technological transformation of the education ecosystem. Mong-Fong Horng received his B.S., Ms. and Ph.D degrees from National Chiao Tung University and National Cheng Kung University, Taiwan in 1989, 1991 and 2003, respectively. He now is a jointly-appointed professor with the department of Electronics Engineering at National Kaohsiung University of Science and Technology, and Kaohsiung Medical University, Taiwan. He served as the president of Taiwanese Association of Consumer Electronics (TACE), Chair of Tainan Chapter, IEEE Signal Processing Society. His research interest includes Internet of Things, machine learning, computer networks and medical informatics and related industrial cooperation. Hari Mohan Pandey works in data science and artificial intelligence at school of technology Bournemouth University, UK. They are featured in the 2022 World Ranking list of Top 2% scientist by Sandford University. They specialized in Computer Science & Engineering. My research area includes artificial intelligence, soft computing techniques, natural language processing, language acquisition, machine learning, deep learning and computer vision. They have been an author of various books in computer science engineering (algorithms, programming and evolutionary algorithms). Recently, my book entitle “State of the Art on Grammatical Inference Using Evolutionary Method " has been published in Elsevier. They have published over 120 scientific papers in reputed journals and conferences. They are serving on the editorial board of reputed journals (including Neural Networks Elsevier, Applied Soft Computing Elsevier, Swarm and Evolutionary Computing Elsevier, Neural Computing and Applications Springer, IEEE Transactions of Evolutionary Computation, IEEE Transactions on Industrial Informatics, Neurocomputing Springer, IEEE Transactions on Fuzzy Systems, IEEE Transactions on Neural Networks and Learning Systems and Knowledge Based Systems Elsevier) as action editor, associate editor, and guest editor. They are a reviewer of top international conferences such as GECCO, CEC, IJCNN, BMVC, AAAI etc. They have delivered expert talks as keynote and invited speaker. They are a fellow of the HEA of the UK Professional Standards Framework (UKPSF) and have a rich teaching experience at the higher education level. They have delivered lecturers in the International summer/winter schools. I have been given the prestigious award “The Global Award for the Best Computer Science Faculty of the Year 2015”, award for completing INDO-US project “GENTLE”, award (Certificate of Exceptionalism) from the Prime Minister of India and award for developing innovative teaching and learning models for higher-education. In past, They worked as a sr. lecturer in computer science department at Edge Hill University. They also worked as a research fellow machine learning at the school of technology at Middlesex University London where they worked on a European Commission project- DREAM4CARS. My role was to research and develop advanced machine learning techniques relevant to the project goals and to evaluate these on both project & reference data sets. To lead and manage relevant work packages in support of the project, ensuring appropriate interfacing with partners.


Best Sellers


Product Details
  • ISBN-13: 9798337349190
  • Publisher: IGI Global
  • Publisher Imprint: Medical Information Science Reference
  • Height: 254 mm
  • No of Pages: 376
  • ISBN-10: 8337349190
  • Publisher Date: 16 Oct 2025
  • Binding: Paperback
  • Language: English
  • Width: 178 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Threat Intelligence and Cloud Trust Models for Healthcare Security
IGI Global -
Threat Intelligence and Cloud Trust Models for Healthcare Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Threat Intelligence and Cloud Trust Models for Healthcare Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!