[1] A. S. Abdulbaqi, S. A. D. M. Najim, S. M. Al-barizinji and I. Y. Panessai, A Secured System for Tele Cardiovascular
Disease Monitoring. In Computational Vision and Bio-Inspired Computing, Springer, Singapore, 2021, pp. 209-222.
[2] A. S. Abdulbaqi, S. A. D. M. Najim and R. H. Mahdi, Robust multichannel EEG signals compression model based
on hybridization technique, International Journal of Engineering and Technology, 7(4) (2018) 3402-3405.
[3] A. S. Abdulbaqi, A. J. Obaid and S. A. H. Alazawi, A Smart System for Health Caregiver Based on IoMT: Toward
Tele-Health Caregiving, iJOE, 17(07) 71, 2021.
[4] A. S. Abdulbaqi, E. S. Yousif and S. Al-din, Virtual Environments Utilization for ECG Signals Analysis and
Evaluation: Towards Heart Condition Assessment, In IOP Conference Series: Materials Science and Engineering,
IOP Publishing, November, 928(3), 2020, p. 032031.
[5] M. Ahmad, M. B. Amin, S. Hussain, B. H. Kang, T. Cheong and S. Lee, Health Fog: a novel framework for health
and wellness applications, Journal of Supercomputing, 72(10) (2016) 3677-3695. https://doi.org/10.1007/s11227-
016-1634-x.
[6] S. Alam, M. M. R. Chowdhury and J. Noll, Interoperability of security-enabled internet of things, Wireless Personal
Communications, 61(3) (2011) 567-586.
[7] S. Alasmari, M. Anwar, Security and privacy challenges in IoT-based health cloud, International Conference on
Computational Science and Computational Intelligence (CSCI), (2016) 198-201.
[8] E. Alkeem, D. Shehada, C. Y. Yeun, M. J. Zemerly and J. Hu, New secure healthcare system using cloud of things,
Cluster Computing, 20(3) (2017) 2211-2229. https://doi.org/10.1007/s10586-017-0872-x.
[9] F. Alsubaee, A. Abuhussein and S. Shiva, Security and privacy in the internet of medical things: taxonomy and risk
assessment, IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), (2017) 112-120.
[10] M. M. Alzghoul, Towards Nationwide Electronic Health Record System in Jordan, 2016, 650-655.
[11] A. N. Baccarini, K. N. Griggs, E. A. Howson, O. Ossipova, T. Hayajneh and C. P. Kohlios, Healthcare Blockchain
System Using Smart Contracts for Secure Automated Remote Patient Monitoring, Journal of Medical Systems,
42(7) (2018) 1-7, https://doi.org/10.1007/s10916-018-0982-x.
[12] C. Bradley, S. El-Tawab and M. H. Heydari, Security analysis of an IoT system used for indoor localization in
healthcare facilities, Systems and Information Engineering Design Symposium (SIEDS), (2018) 147-152.
[13] S. Chen, D. L. Chiang, C. Liu, T. Chen, F. Lai, H. Wang and W. Wei, Confidentiality Protection of Digital Health
Records in Cloud Computing, Journal of Medical Systems, 2016, https://doi.org/10.1007/s10916-016-0484-7.
[14] M. Chiang and T. Zhang, Fog and IoT: An overview of research opportunities, IEEE Internet of Things Journal,
3(6) (2016) 854-864.
[15] K. Chung and R. C. Park, PHR open platform based smart health service using distributed object group framework,
Cluster Computing, 19(1) (2016) 505-517.[16] A. Ekblaw, A. Azaria, J. D. Halamka and A. Lippman, A Case Study for Blockchain in Healthcare:”MedRec”
prototype for electronic health records and medical research data, Proceedings of IEEE Open & Big Data Conference,
13, 13, August 2016.
[17] M. H. Ellewe, A. M. Sagheer and A. S. Abdulbaqi, A New Medical Images Encryption algorithm Based on Gold
Code: Futures Trends Towards Telemedicine, In IOP Conference Series: Materials Science and Engineering, IOP
Publishing, 928(3), November 2020, p. 032032.
[18] S. Ghanavati, J. H. Abawajy, D. Izadi and A. A. Alelaiwi, Cloud-assisted IoT-based health status monitoring
framework, Cluster Computing, 20(2) (2017) 1843-1853. https://doi.org/10.1007/s10586-017-0847-y.
[19] M. M. Hossain, M. Fotouhi and R. Hasan, Towards an analysis of security issues, challenges and open problems
in the internet of things, 2015 IEEE World Congress on Services, (2015) 21-28.
[20] M. S. Hossain and G. Muhammad, Cloud-assisted industrial internet of things (iiot)-enabled framework for health
monitoring, Computer Networks, 101 (2016) 192- 202.
[21] M. N. Jain, Security And Privacy Optimization And Service Provider Selection For Cloud Computing For Small
And Medium Educational Institutions, Turkish Journal of Computer and Mathematics Education, TURCOMAT,
12(10) (2021) 3753-3762.
[22] Z. Lie, X. Huang, Z. Hu, M. K. Khan, H. Seo and L. Zhou, On Emerging Family of Elliptic
Curves to Secure Internet of Things: Elliptic Curve Cryptography Comes of Age, XX(XX), (2016) 1-12,
https://doi.org/10.1109/TDSC.2016.257702 2.
[23] Y. Ma, Y. Wang, J. U. N. Yang and Y. Miao, Big Health Application System based on Health Internet of Things
and Big Data, (2017) 7885-7897.
[24] S. R. Oh and Y. G. Kim, Security requirements analysis for the IoT, International Conference on Platform
Technology and Service (PlatCon), (2017) 1-6.
[25] A. P. Oladeji and A. Olubunmi, Data Offloading Security Framework in MCLOUD, Journal of Computer Sciences
and Applications, 5(1) (2017) 25-28.
[26] Y. Rahulamathavan, R. C. W. Phan, M. Rajarajan, S. Misra and A. Kondoz, Privacy-preserving blockchain
based IoT ecosystem using attribute-based encryption, IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), 2017, 1-6.
[27] Y. B. Saied, A. Olivereau, D. Zeghlache and M. Laurent, Trust management system design for the Internet of
Things: A context-aware and multi-service approach, Computers & Security, 39 (2013) 351-365.
[28] D. S´anchez and A. Viejo, Personalized privacy in open data sharing scenarios, Online Information Review, 2017.
[29] S. Singh, P. K. Sharma, S. Y. Moon and J. H. Park, Advanced lightweight encryption algorithms for IoT devices:
survey, challenges and solutions, Journal of Ambient Intelligence and Humanized Computing, (2017) 1-18.
[30] G. S. Tamizharasi, IoT-Based E- Health System Security?: A Vision Archictecture Elements and Future Directions, (2017) 655-661.
[31] M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon and R. Guizzetti, OSCAR: Object security
architecture for the Internet of Things, Proceeding of IEEE International Symposium on a World of Wireless,
Mobile and Multimedia Networks 2014, WoWMoM 2014. https://doi.org/10.1109/WoWMoM.2014.69 , 18975.
[32] P. A. H. Williams and V. McCauley, Always connected: The security challenges of the healthcare Internet of
Things, IEEE 3rd World Forum on Internet of Things (WF-IoT), (2016) 30-35.
[33] M.Wolfson, S. E. Wallace, N. Masca, G Rowe, N. A. Sheehan, V. Ferretti and P. R. Burton, DataSHIELD:
resolving a conflict in contemporary bioscience-performing a pooled analysis of individual-level data without sharing
the data, International journal of epidemiology, 39(5) (2010) 1372-1382.
[34] Y. Yang, X. Zheng and C. Tang, Lightweight distributed secure data management system for health internet of
things, Journal of Network and Computer Applications, 89 (2017) 26-37.
[35] E. S. Yousif, A. S. Abdulbaqi, A. Z. Hameed and S. Al-din, Electroencephalogram Signals Classification Based
on Feature Normalization, In IOP Conference Series: Materials Science and Engineering, IOP Publishing, 928(3),
November 2020, p. 032028.
[36] T. Zachariah, N. Klugman, B. Campbell, J. Adkins, N. Jackson and P. Dutta, The internet of things has a
gateway problem, HotMobile 2015 - 16th International Workshop on Mobile Computing Systems and Applications,
2015, 27- 32. https://doi.org/10.1145/2699343.2699344.
[37] J. Zeng, Z. Long, G. Shen, L. Wei and Y. Song, MCloud: Efficient Monitoring Framework for Cloud Computing
Platforms, In International Conference on Security, Privacy and Anonymity in Computation, Communication and
Storage, Springer, Cham, December 2017, pp. 409-419.