Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective
Jasleen Kaur,1 Asif Irshad Khan,2 Yoosef B Abushark,2 Md Mottahir Alam,3 Suhel Ahmad Khan,4 Alka Agrawal,1 Rajeev Kumar,1 Raees Ahmad Khan1 1Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, UP, India; 2Computer Science Department, Faculty of Computing and Informa...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Book |
Published: |
Dove Medical Press,
2020-04-01T00:00:00Z.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | doaj_dc0b35fb2b994477b0f08f6c16a908d1 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Kaur J |e author |
700 | 1 | 0 | |a Khan AI |e author |
700 | 1 | 0 | |a Abushark YB |e author |
700 | 1 | 0 | |a Alam MM |e author |
700 | 1 | 0 | |a Khan SA |e author |
700 | 1 | 0 | |a Agrawal A |e author |
700 | 1 | 0 | |a Kumar R |e author |
700 | 1 | 0 | |a Khan RA |e author |
245 | 0 | 0 | |a Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective |
260 | |b Dove Medical Press, |c 2020-04-01T00:00:00Z. | ||
500 | |a 1179-1594 | ||
520 | |a Jasleen Kaur,1 Asif Irshad Khan,2 Yoosef B Abushark,2 Md Mottahir Alam,3 Suhel Ahmad Khan,4 Alka Agrawal,1 Rajeev Kumar,1 Raees Ahmad Khan1 1Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, UP, India; 2Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia; 3Department of Electrical & Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia; 4Department of Computer Science, Indira Gandhi National TribalUniversity, Amarkantak, MP, IndiaCorrespondence: Rajeev Kumar Email rs0414@gmail.comIntroduction: The imperative need for ensuring optimal security of healthcare web applications cannot be overstated. Security practitioners are consistently working at improvising on techniques to maximise security along with the longevity of healthcare web applications. In this league, it has been observed that assessment of security risks through soft computing techniques during the development of web application can enhance the security of healthcare web applications to a great extent.Methods: This study proposes the identification of security risks and their assessment during the development of the web application through adaptive neuro-fuzzy inference system (ANFIS). In this article, firstly, the security risk factors involved during healthcare web application development have been identified. Thereafter, these security risks have been evaluated by using the ANFIS technique. This research also proposes a fuzzy regression model.Results: The results have been compared with those of ANFIS, and the ANFIS model is found to be more acceptable for the estimation of security risks during the healthcare web application development.Conclusion: The proposed approach can be applied by the healthcare web application developers and experts to avoid the security risk factors during healthcare web application development for enhancing the healthcare data security.Keywords: healthcare web application, security risk assessment, fuzzy systems, neural network, adaptive neuro-fuzzy inference system | ||
546 | |a EN | ||
690 | |a healthcare web application | ||
690 | |a security risk assessment | ||
690 | |a fuzzy systems | ||
690 | |a neural network | ||
690 | |a adaptive neuro-fuzzy inference system. | ||
690 | |a Public aspects of medicine | ||
690 | |a RA1-1270 | ||
655 | 7 | |a article |2 local | |
786 | 0 | |n Risk Management and Healthcare Policy, Vol Volume 13, Pp 355-371 (2020) | |
787 | 0 | |n https://www.dovepress.com/security-risk-assessment-of-healthcare-web-application-through-adaptiv-peer-reviewed-article-RMHP | |
787 | 0 | |n https://doaj.org/toc/1179-1594 | |
856 | 4 | 1 | |u https://doaj.org/article/dc0b35fb2b994477b0f08f6c16a908d1 |z Connect to this object online. |