
Autonomous security assessment model using genetic algorithm in cyber-security domain for healthcare documents
Author(s) -
Muzammil H Mohammed
Publication year - 2022
Publication title -
international journal of health sciences (ijhs) (en línea)
Language(s) - English
Resource type - Journals
eISSN - 2550-6978
pISSN - 2550-696X
DOI - 10.53730/ijhs.v6ns1.4862
Subject(s) - dependability , computer science , genetic algorithm , key (lock) , domain (mathematical analysis) , information security , data mining , plan (archaeology) , network security , quality (philosophy) , computer security , machine learning , mathematics , software engineering , philosophy , epistemology , history , mathematical analysis , archaeology
In this article, an organization data security appraisal model dependent on abreast hypothesis was considered and advanced. Based on completely considering the data security issues evaluation interaction and components, the degree and mischief of the assault were broke down, and information sources and the particular techniques for incorporating circumstance factors and key hubs were applied to plan the general model, in this way guaranteeing the precision of healthcare documents through cyber-security approaches. The use of hereditary calculation in the dependability investigation of PC correspondence networks is of extraordinary importance. In this paper, the dependability examination and utilization of PC correspondence network dependent on hereditary calculation were considered. The primary substances of hereditary calculation were presented. Simultaneously, the primary substance and exploration techniques for the unwavering quality investigation of PC correspondence network were talked about. Finally, the exploration results were examined and talked about. The outcomes show that the use of hereditary calculation in PC correspondence network dependability investigation is acceptable, which gives a positive evaluation to attain better efficiency of PC correspondence network.