Thuemmler, C. (2017, May). 5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017, Paris
The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry wort...
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., …Covaci, S. (2015). 5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission
Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addr...
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017). Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), (1-38). doi:10.1145/3041956. ISSN 0360-0300
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. doi:10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. doi:10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 562-567. doi:10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
Lo, O., Fan, L., Buchanan, W. J. & Thuemmler, C. (2011). Technical evaluation of an e-health platform. In Macedo, M. (Ed.). Proceedings of the IADIS International Conference e-Health 2012ISBN 978-972-8939-70-0
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...