RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques

        Sultan H. Almotiri,Mohd Nadeem,Mohammed A. Al Ghamdi,Raees Ahmad Khan 한국지능시스템학회 2023 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.23 No.3

        The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼