[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets

JK Madhloom, ZH Noori, SK Ebis, OA Hassen… - Computers, 2023 - mdpi.com
Due to the Internet's explosive growth, network security is now a major concern; as a result,
tracking network traffic is essential for a variety of uses, including improving system …

[HTML][HTML] Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays

M Grossi, F Alfonsi, M Prandini, A Gabrielli - Future Internet, 2024 - mdpi.com
One of the most common mitigations against network-borne security threats is the
deployment of firewalls, ie, systems that can observe traffic and apply rules to let it through if …

Detection of web-based attacks using tree-based learning models: An evaluation study

O Chakir, Y Sadqi - International Conference on Artificial Intelligence and …, 2023 - Springer
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …

Defending Against XML External Entity (XXE) Attacks: A Review and Comparative Analysis of Prevention Mechanisms

B Hulloowan, G Bekaroo - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
With advancing technologies, Extensible Markup Language (XML) has become a popular
document format that is used by a wide range of applications. This document format is used …

Laboratory LIMATI, FPBM, USMS, Beni Mellal, Morocco oumaima. chakirfpb@ usms. ac. ma, y. sadqi@ usms. ma

O Chakir - … Intelligence and Green Computing: Proceedings of …, 2023 - books.google.com
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …

Інформаційна технологія динамічної пріоритезації вхідного трафіку в умовах нестачі обчислювальних ресурсів

МР Наталуха - 2023 - essuir.sumdu.edu.ua
Розроблено інформаційну технологію динамічної пріоритезації трафіку та
імплементовано у як конфігурацію модуля для застосунку NGINX який використовує …

Linux 로그 분석을 통한 공격자 차단 시간의 동적 설정 방법 연구

조진용, 박주원, 김승해, 조부승 - 한국통신학회논문지, 2024 - dbpia.co.kr
네트워크 방화벽은 외부의 보안 공격으로부터 내부 자원을 보호하는 핵심 보안 요소이지만,
방화벽 규칙이 증가하면 성능이 저하되고 관리 부담이 늘어나는 문제가 있다. 특히, 소규모 …