[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets
Due to the Internet's explosive growth, network security is now a major concern; as a result,
tracking network traffic is essential for a variety of uses, including improving system …
tracking network traffic is essential for a variety of uses, including improving system …
[HTML][HTML] Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
One of the most common mitigations against network-borne security threats is the
deployment of firewalls, ie, systems that can observe traffic and apply rules to let it through if …
deployment of firewalls, ie, systems that can observe traffic and apply rules to let it through if …
Detection of web-based attacks using tree-based learning models: An evaluation study
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
Defending Against XML External Entity (XXE) Attacks: A Review and Comparative Analysis of Prevention Mechanisms
B Hulloowan, G Bekaroo - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
With advancing technologies, Extensible Markup Language (XML) has become a popular
document format that is used by a wide range of applications. This document format is used …
document format that is used by a wide range of applications. This document format is used …
Laboratory LIMATI, FPBM, USMS, Beni Mellal, Morocco oumaima. chakirfpb@ usms. ac. ma, y. sadqi@ usms. ma
O Chakir - … Intelligence and Green Computing: Proceedings of …, 2023 - books.google.com
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
Інформаційна технологія динамічної пріоритезації вхідного трафіку в умовах нестачі обчислювальних ресурсів
МР Наталуха - 2023 - essuir.sumdu.edu.ua
Розроблено інформаційну технологію динамічної пріоритезації трафіку та
імплементовано у як конфігурацію модуля для застосунку NGINX який використовує …
імплементовано у як конфігурацію модуля для застосунку NGINX який використовує …
Linux 로그 분석을 통한 공격자 차단 시간의 동적 설정 방법 연구
조진용, 박주원, 김승해, 조부승 - 한국통신학회논문지, 2024 - dbpia.co.kr
네트워크 방화벽은 외부의 보안 공격으로부터 내부 자원을 보호하는 핵심 보안 요소이지만,
방화벽 규칙이 증가하면 성능이 저하되고 관리 부담이 늘어나는 문제가 있다. 특히, 소규모 …
방화벽 규칙이 증가하면 성능이 저하되고 관리 부담이 늘어나는 문제가 있다. 특히, 소규모 …