<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1646-9895</journal-id>
<journal-title><![CDATA[RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação]]></journal-title>
<abbrev-journal-title><![CDATA[RISTI]]></abbrev-journal-title>
<issn>1646-9895</issn>
<publisher>
<publisher-name><![CDATA[AISTI - Associação Ibérica de Sistemas e Tecnologias de Informação]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1646-98952022000300087</article-id>
<article-id pub-id-type="doi">10.17013/risti.47.87-108</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[Modelagem Bayesiana aplicada para cálculo da probabilidade de falha em Sistemas de Saúde IoT]]></article-title>
<article-title xml:lang="en"><![CDATA[Bayesian modeling applied to calculate the probability of failure in IoT Health Systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kinjo]]></surname>
<given-names><![CDATA[Erika Midori]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Librantz]]></surname>
<given-names><![CDATA[André Felipe Henriques]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[Edson Melo de]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[Fábio Cosme Rodrigues dos]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidade Nove de Julho  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Brazil</country>
</aff>
<pub-date pub-type="pub">
<day>30</day>
<month>09</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>30</day>
<month>09</month>
<year>2022</year>
</pub-date>
<numero>47</numero>
<fpage>87</fpage>
<lpage>108</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_arttext&amp;pid=S1646-98952022000300087&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_abstract&amp;pid=S1646-98952022000300087&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_pdf&amp;pid=S1646-98952022000300087&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo A implantação da tecnologia da Internet das Coisas (IoT) traz benefícios à vida, como controle remoto de pragas na agricultura, monitoramento da cadeia de suprimentos, melhoria na educação e monitoramento de pacientes. No entanto, apesar dos benefícios, existem desafios embutidos na implementação desta tecnologia. Um dos maiores desafios da área é a violação de privacidade e segurança de dados. Portanto, é necessário avaliar a probabilidade de falha dos elementos e, consequentemente, a causa desse problema. Assim, é neste contexto que este trabalho se propõe a identificar, modelar e calcular a probabilidade de falha através de uma análise sistemática, utilizando Redes Bayesianas. Os resultados mostraram que através do uso do modelo proposto foi possível avaliar diferentes cenários para o uso de redes de Internet das Coisas, bem como simular o efeito da probabilidade de falha nos elementos críticos do sistema.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The implementation of the Internet of Things (IoT) technology provides benefits to life, such as remote pest control in agriculture, monitoring the supply chain, improvement environment in education, and monitoring patients. However, despite the benefits, there are challenges embedded in the implementation of this technology. One of the biggest challenges in the area is the violation of privacy and data security. Therefore, it is necessary to assess the probability of failure of the components and, consequently, the cause of this problem. So, it is in this context that this work proposes to identify, model, and calculate the failure probability through a systematic analysis, using Bayesian Networks. The results showed that through the use of the proposed model it was possible to evaluate different scenarios for the use of Internet of Things networks, as well as to simulate the effect of the probability of failure in the critical components of the system.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[Rede Bayesianas]]></kwd>
<kwd lng="pt"><![CDATA[Falha]]></kwd>
<kwd lng="pt"><![CDATA[Saúde]]></kwd>
<kwd lng="pt"><![CDATA[Internet das Coisas]]></kwd>
<kwd lng="pt"><![CDATA[Noisy-OR]]></kwd>
<kwd lng="en"><![CDATA[Bayesian Network]]></kwd>
<kwd lng="en"><![CDATA[Failure]]></kwd>
<kwd lng="en"><![CDATA[Health]]></kwd>
<kwd lng="en"><![CDATA[Internet of Things]]></kwd>
<kwd lng="en"><![CDATA[IoT]]></kwd>
<kwd lng="en"><![CDATA[Noisy-OR]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anjum]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[M. A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Reddy]]></surname>
<given-names><![CDATA[A. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Saba]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Farooq]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy preserving data by conceptualizing smart cities using MIDR-Angelization]]></article-title>
<source><![CDATA[Sustainable Cities and Society]]></source>
<year>2018</year>
<volume>40</volume>
<page-range>326-34</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alexandre]]></surname>
<given-names><![CDATA[N. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Coluci]]></surname>
<given-names><![CDATA[M. Z. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validade de conteúdo nos processos de construção e adaptação de instrumentos de medidas]]></article-title>
<source><![CDATA[Ciência &amp; Saúde Coletiva]]></source>
<year>2011</year>
<volume>16</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>3061-8</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albahri]]></surname>
<given-names><![CDATA[O. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Albahri]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaidan]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaidan]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Alsalem]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohsin]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohammed]]></surname>
<given-names><![CDATA[K. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Alamoodi]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Nidhal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Enaizan]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Chyad]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abdulkareem]]></surname>
<given-names><![CDATA[K. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Almahdi]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Al Shafeey]]></surname>
<given-names><![CDATA[G. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Baqer]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jasim]]></surname>
<given-names><![CDATA[A. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jalood]]></surname>
<given-names><![CDATA[N. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shareef]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fault-Tolerant mHealth Framework in the Context of IoT Based Real-Time Wearable Health Data Sensor]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>50052-80</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Khand]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwak]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullahe]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwak]]></surname>
<given-names><![CDATA[K. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Type-2 fuzzy ontology-aided recommendation systems for IoT-based healthcare]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2018</year>
<volume>119</volume>
<page-range>138-55</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azimi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Pahikkala]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahmani]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Niela-Vilén]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Axelin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Liljeberg]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Missing data resilient decision-making for healthcare IoT through personalization: A case study on maternal health]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2019</year>
<volume>96</volume>
<page-range>297-308</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellucci Júnior]]></surname>
<given-names><![CDATA[J. A. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Matsuda]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Construção e validação de instrumento para avaliação do acolhimento com Classificação de Risco]]></article-title>
<source><![CDATA[Revista Brasileira de Enfermagem]]></source>
<year>2012</year>
<volume>65</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>751-7</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ben-Daya]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassini]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bahroun]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet of things and supply chain management: a literature review]]></article-title>
<source><![CDATA[International Journal of Production Research]]></source>
<year>2019</year>
<volume>57</volume>
<page-range>15-6</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[S-I.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[L-M.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[J.-C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk factors of enterprise internal control under the internet of things governance: A qualitative research approach]]></article-title>
<source><![CDATA[Information &amp; Management]]></source>
<year>2020</year>
<volume>57</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Creswell]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[V. L. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pesquisa de Métodos Mistos]]></source>
<year>2013</year>
<publisher-name><![CDATA[Editora Penso]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Domingues]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Alberto]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Leitão]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tavares]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lima]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Radwan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sucasas]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodriguez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[André]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Antunes]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Insole Optical Fiber Sensor Architecture for Remote Gait Analysis-An e-Health Solution]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2019</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>207-14</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elsaadany]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Soliman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Experimental Evaluation of Internet of Things in the Educational Environment]]></article-title>
<source><![CDATA[International Journal of Engineering Pedagogy]]></source>
<year>2017</year>
<volume>7</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>50-60</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Federação De Cientistas Americanos</collab>
<source><![CDATA[Disruptive Civil Technologies: Six Technologies With Potential Impacts On Us Interests Out To 2025]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gia]]></surname>
<given-names><![CDATA[T. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarker]]></surname>
<given-names><![CDATA[V. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Tcarenko]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahmani]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Westerlund]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Liljeberg]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Tenhunen]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Energy efficient wearable sensor node for IoT-based fall detection systems]]></article-title>
<source><![CDATA[Microprocessors and Microsystems]]></source>
<year>2018</year>
<volume>56</volume>
<page-range>34-46</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guerrero-Rodriguez]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cobos-Sanchez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez-de-La-Rosa]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sales-Lerida]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Embedded Sensor Node for the Surveillance of Power Quality]]></article-title>
<source><![CDATA[Energies]]></source>
<year>2019</year>
<volume>12</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1561</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gyamfi K. S.]]></surname>
<given-names><![CDATA[Brusey J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaura]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilkins]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Heartbeat design for energy-aware IoT: Are your sensors alive?]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2019</year>
<volume>128</volume>
<page-range>124-39</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heckerman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mamdani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wellman]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Real-World Applications of Bayesian Networks]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1995</year>
<volume>38</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>24-5</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hou]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[Y. Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Unstructured big data analysis algorithm and simulation of Internet of Things based on machine learning]]></article-title>
<source><![CDATA[Neural Computing &amp; Applications]]></source>
<year>2020</year>
<volume>32</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>5399-407</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bai]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bian]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[UAV Aided Aerial-Ground IoT for Air Quality Sensing in Smart City: Architecture, Technologies, and Implementation]]></article-title>
<source><![CDATA[IEEE Network]]></source>
<year>2019</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>14-22</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[S. M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwak]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kabir]]></surname>
<given-names><![CDATA[Md. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahmud]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kyung-Suo]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Internet of Things for Health Care: A Comprehensive Survey]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2015</year>
<volume>3</volume>
<page-range>678-708</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Librantz]]></surname>
<given-names><![CDATA[A. F. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Spinola]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveira Neto]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zerbinatti]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk assessment in software supply chains using the Bayesian method]]></article-title>
<source><![CDATA[International Journal of Production Research]]></source>
<year>2020</year>
<volume>59</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>6758-75</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y-B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y-W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[J-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hung]]></surname>
<given-names><![CDATA[H-N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SensorTalk: An IoT Device Failure Detection and Calibration Mechanism for Smart Farmin]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2019</year>
<volume>19</volume>
<numero>21</numero>
<issue>21</issue>
<page-range>4788</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lomotey]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Pry]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sriramoju]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Wearable IoT data stream traceability in a distributed health information system]]></article-title>
<source><![CDATA[Pervasive and Mobile Computing]]></source>
<year>2017</year>
<volume>40</volume>
<page-range>692-707</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mali]]></surname>
<given-names><![CDATA[A. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recent Domain-Specific Applications of Artificial Intelligence Using IoT]]></article-title>
<source><![CDATA[International Journal on Artificial Intelligence Tools]]></source>
<year>2019</year>
<volume>28</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mittelstadt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ethics of the health-related internet of things: a narrative review]]></article-title>
<source><![CDATA[Ethics and Information Technology]]></source>
<year>2017</year>
<volume>19</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>157-75</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mittelstadt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Designing the health-related internet of things: Ethical principles and guidelines]]></article-title>
<source><![CDATA[Information]]></source>
<year>2017</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>25</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muhammed]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehmood]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Albeshri]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Katib]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[UbeHealth: A Personalized Ubiquitous Cloud and Edge-Enabled Networked Healthcare System for Smart Cities]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>32258-85</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>Organização das Nações Unidas</collab>
<source><![CDATA[OMS: custos com saúde já representam 10% do PIB mundial]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patterson]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Eng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Horowitz]]></surname>
<given-names><![CDATA[S. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gorlin]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldstein]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bayesian comparison of cost-effectiveness of different clinical approaches to diagnose coronary artery disease]]></article-title>
<source><![CDATA[Journal of The American College of Cardiology]]></source>
<year>1984</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>278-89</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pearl]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fusion, Propagation and Structuring in Belief Networks]]></article-title>
<source><![CDATA[Artificial Intelligence]]></source>
<year>1986</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>241-88</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ray]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the role of internet of things towards smart e- healthcare services]]></article-title>
<source><![CDATA[Biomedical Research India]]></source>
<year>2017</year>
<volume>28</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1604-9</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Selvan]]></surname>
<given-names><![CDATA[N. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vairavasundaram]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fuzzy ontology-based personalized recommendation for internet of medical things with linked open data]]></article-title>
<source><![CDATA[Journal of Intelligent &amp; Fuzzy Systems]]></source>
<year>2019</year>
<volume>36</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>4065-74</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sood]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahajan]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Wearable IoT sensor-based healthcare system for identifying and controlling chikungunya virus]]></article-title>
<source><![CDATA[Computers in Industry]]></source>
<year>2017</year>
<volume>91</volume>
<page-range>33-44</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qingping S.]]></surname>
<given-names><![CDATA[Jian]]></given-names>
</name>
<name>
<surname><![CDATA[K.]]></surname>
<given-names><![CDATA[Rong]]></given-names>
</name>
<name>
<surname><![CDATA[W.]]></surname>
<given-names><![CDATA[Hang]]></given-names>
</name>
<name>
<surname><![CDATA[Y.]]></surname>
<given-names><![CDATA[Yun]]></given-names>
</name>
<name>
<surname><![CDATA[L.]]></surname>
<given-names><![CDATA[Jie W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Framework of Intrusion Detection System based on Bayesian Network in IoT]]></article-title>
<source><![CDATA[International Journal Performability Engineer]]></source>
<year>2018</year>
<volume>14</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2280-8</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rouse]]></surname>
<given-names><![CDATA[W. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Failure Management: malfunctions of technologies, organizations and society]]></source>
<year>2021</year>
<publisher-loc><![CDATA[OXFORD, United Kingdom ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sareen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sood]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure Internet of Things-based Cloud Framework to Control Zika Virus Outbreak]]></article-title>
<source><![CDATA[International Journal of Technology Assessment in Health Care]]></source>
<year>2017</year>
<volume>33</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11-8</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen K.]]></surname>
<given-names><![CDATA[Sheth A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems]]></article-title>
<source><![CDATA[IEEE Internet Computing]]></source>
<year>2018</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>42-51</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[F. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems]]></article-title>
<source><![CDATA[Journal of Information Science and Engineering]]></source>
<year>2017</year>
<volume>33</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1069-83</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Halim]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Health care Monitoring System and Analytics Based on Internet of Things Framework]]></article-title>
<source><![CDATA[IETE Journal of Research]]></source>
<year>2019</year>
<volume>65</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>653-60</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vhaduri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Poellabauer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2019</year>
<volume>14</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>3116-25</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Environment supervision system for chemical industry park based on IOT]]></article-title>
<source><![CDATA[Chemical Engineering Transactions]]></source>
<year>2018</year>
<volume>67</volume>
<page-range>481-6</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcgill]]></surname>
<given-names><![CDATA[T. J.]]></given-names>
</name>
<name>
<surname><![CDATA[KLOBAS]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I Want It Anyway: Consumer Perceptions of Smart Home Devices]]></article-title>
<source><![CDATA[Journal of Computer Information Systems]]></source>
<year>2020</year>
<volume>60</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>437-47</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilkerson]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Colston]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mitigating Sports Injury Risks Using Internet of Things and Analytics Approaches]]></article-title>
<source><![CDATA[Risk Analysis]]></source>
<year>2018</year>
<volume>38</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1348-60</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Woo]]></surname>
<given-names><![CDATA[M. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A reliable IoT system for Personal Healthcare Devices]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2017</year>
<volume>78</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>626-40</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zagorecki]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Druzdzel]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Knowledge Engineering for Bayesian Networks: How Common Are Noisy-MAX Distributions in Practice?]]></article-title>
<source><![CDATA[IEEE Transactions on Systems Man Cybernetics-Systems]]></source>
<year>2013</year>
<volume>43</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>186-95</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fault Detection and Repairing for Intelligent Connected Vehicles Based on Dynamic Bayesian Network Model]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2018</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>2431-40</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security authentication technology based on dynamic Bayesian network in Internet of Things]]></article-title>
<source><![CDATA[Journal of Ambient Intelligence and Humanized Computing]]></source>
<year>2020</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>573-80</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
