The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer …
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber security. Specifically, we present cyber security threats and evaluation metrics used in the …
S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G Internet need services offered by cloud computing for processing and storing more …
Y Alghofaili, A Albattah, N Alrajeh, MA Rassam… - Applied Sciences, 2021 - mdpi.com
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing …
Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port …
L Karuppusamy, J Ravi, M Dabbu… - … Journal of Numerical …, 2022 - Wiley Online Library
Cloud computing is susceptible to the existing information technology attacks, as it extends and uses the traditional operating system, information technology infrastructure, and …
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of geographically dispersed 'Internet of Thing'devices have exponentially increased network …
P Purnaye, V Kulkarni - Archives of Computational Methods in …, 2022 - Springer
Cloud Computing has many facets to it which makes it diverse. Investigation of a cyber-crime that involves the cloud as a subject, object, or as an environment, is cloud forensics …