[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems

AA Eshmawi, M Khayyat, S Abdel-Khalek… - Cluster …, 2023 - Springer
Abstract Cyber Physical System (CPS) plays an important role in industry 4.0 applications
such as smart factories, smart energy, smart transportation, smart buildings, smart …

Leveraging cloud-native microservices architecture for high performance real-time intra-day trading: A tutorial

M Hota, AM Abdelmoniem, M Xu, SS Gill - 6G Enabled Fog Computing in …, 2023 - Springer
Day trading has been gaining attention from prospective investors over the past decades,
even more so in the last decade due to a plethora of factors such as instantaneous …

A Cloud-Native Knowledge Management Framework for Patient-Generated Health Data

M Majdalawieh, AB Hani, H Al-Sabbah… - … on Social Networks …, 2023 - ieeexplore.ieee.org
Societal proliferation with mobile and wearable devices has given rise to patient-generated
health data (PGHD). This refers to data from such devices that monitor, observe and report …

Security Threat Early Warning of Distance Education System Based on Blockchain

Z Chen, G Srivastava - Journal of Internet Technology, 2023 - jit.ndhu.edu.tw
To ensure the safe and stable operation of distance education systems, a security threat
early warning technology based on blockchain is proposed for distance education system …

[PDF][PDF] Enhancing Container Runtime Security: A Case Study in Threat Detection.

A Eldjou, ME Amoura, M Soltane, M Belguidoum… - TACC, 2023 - ceur-ws.org
In recent years, advances in software development, operation, and maintenance
technologies have driven the increasing prevalence of Cloud native architecture. This …

HackerGraph: Creating a knowledge graph for security assessment of AWS systems

A Stournaras - 2023 - diva-portal.org
With the rapid adoption of cloud technologies, organizations have benefited from improved
scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has …