AgroXAI: Explainable AI-Driven Crop Recommendation System for Agriculture 4.0 DOI

Özlem Turgut,

İbrahim Kök, Suat Özdemi̇r

и другие.

2021 IEEE International Conference on Big Data (Big Data), Год журнала: 2024, Номер unknown, С. 7208 - 7217

Опубликована: Дек. 15, 2024

Язык: Английский

Evaluation of cyber security risk pillars for a digital, innovative, and sustainable model utilizing a novel fuzzy hybrid optimization DOI
Mehmet Erdem, Akın Özdemir

Computers & Security, Год журнала: 2025, Номер unknown, С. 104394 - 104394

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

1

Harnessing Machine Learning Intelligence Against Cyber Threats DOI
Bhupinder Singh, Christian Kaunert, Ritu Gautam

и другие.

Advances in business strategy and competitive advantage book series, Год журнала: 2024, Номер unknown, С. 319 - 352

Опубликована: Авг. 28, 2024

The spread of cyberthreats in the digital age presents serious concerns to national security, stability economy, and personal privacy. Traditional security methods are unable keep up with increasing sophistication size cyberattacks. With facilitating quick identification mitigation cyberthreats, machine learning (ML) has revolutionary potential improve cybersecurity measures. But applying ML this field also brings important moral legal issues, particularly light international cybercrimes. This chapter comprehensively explores learning's dual nature cybersecurity, emphasizing both its advantages disadvantages. It talk about state cyber threats today, how is being incorporated into ramifications using investigations.

Язык: Английский

Процитировано

4

Industry 5.0: a conceptual cybersecurity model for secured digital transformation of enterprises DOI
Abhik Chaudhuri,

R. Jayalakshmi,

Pradip Kumar Bala

и другие.

EDPACS, Год журнала: 2025, Номер unknown, С. 1 - 38

Опубликована: Янв. 6, 2025

The diverse range of emerging technologies from Industry 4.0 presented enterprises with significant opportunities to develop new product and service models. However, increased cybersecurity threats attacks in pose a challenge the operations globally. rapid pace digital transformation enterprises, combined inadequate security controls, is creating vulnerabilities for potential cyber-attacks. To address 4.0's constraints, are contemplating 5.0 paradigm. challenges should be addressed increase operational resilience trustworthiness. these key focus areas have been identified this article considering evolving threats. Utilizing design science research methodology knowledge framework, conceptual model has recommended on aspects technology, process, people, services assist all sizes proactively their journey.

Язык: Английский

Процитировано

0

Future Trends in Generative AI for Cyber Defense DOI
Azeem Khan, N. Z. Jhanjhi,

Haji Abdul Hafidz bin Haji Omar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 135 - 168

Опубликована: Фев. 14, 2025

The chapter entitled “Future Trends and Challenges in Cybersecurity Generative AI,” presents a comprehensive exploration of the changing dynamics at intersection between rapidly growing landscape interconnectivity various devices— Internet Things innovations piloted by advancements generative artificial intelligence. In following background-focused analysis, significance enactment new levels security details this fast-growing virulently expansive is emphasized, with AI ultimately serving as highlight. conversation consequently shifts to threats. This includes detailed depiction cybersecurity threats rooted AI, featuring malicious actors incidents, such increasingly popular phenomenon ransomware-as-a-service mirror illustrations dynamic multifaceted character these

Язык: Английский

Процитировано

0

Cyber Security Risk in Smart Agriculture in Regional Australia DOI
Arjun Neupane, Tej Bahadur Shahi, Sameer Sitoula

и другие.

IGI Global eBooks, Год журнала: 2025, Номер unknown, С. 339 - 360

Опубликована: Май 1, 2025

Agriculture is a fundamental global primary industry, evolving with advances in ICT and automation. The rise ‘smart farming' integrates cutting-edge technologies like IoT, drones, sensors, GPS, big data analytics, AI to improve efficiency, productivity, sustainability. These innovations facilitate real-time monitoring, data-driven decisions, automation key farming tasks, including soil analysis, irrigation, crop health evaluation, pest management. However, the adoption of smart introduces cybersecurity risks. This chapter explores threats regional Australia. As farmers increasingly rely on advanced such as drones satellites, blockchain, robotics, implementing measures vital. Without robust security, may lose trust these technologies. Farm IT assets require raising awareness, promoting best practices integrating into agricultural systems.

Язык: Английский

Процитировано

0

Use of robotics in broiler production systems: a relationship between technology, environment and production DOI
Glauber da Rocha Balthazar, Robson Mateus Freitas Silveira, Iran José Oliveira da Silva

и другие.

Tropical Animal Health and Production, Год журнала: 2025, Номер 57(3)

Опубликована: Март 29, 2025

Язык: Английский

Процитировано

0

Digitalisation and Cybersecurity: Towards an Operational Framework DOI Open Access
Bilgin Metin,

Fatma Gül Özhan,

Martín Wynn

и другие.

Electronics, Год журнала: 2024, Номер 13(21), С. 4226 - 4226

Опубликована: Окт. 28, 2024

As businesses increasingly adopt digital processes and solutions to enhance efficiency productivity, they face heightened cybersecurity threats. Through a systematic literature review concept development, this article examines the intersection of digitalisation cybersecurity. It identifies methodologies tools used for assessments, factors influencing adoption measures, critical success implementing these measures. The also puts forward governance process categories, which are classify uncovered in research. Findings suggest that current information security standards tend be too broad not adequately tailored specific needs small medium-sized enterprises (SMEs) when emerging technologies, like Internet Things (IoT), blockchain, artificial intelligence (AI). Additionally, often employ top-down approach, makes it challenging SMEs effectively implement them, as require more scalable their risks limited resources. study thus proposes new framework based on Plan-Do-Check model, built around categories three core pillars governance, culture standards. This is essentially bottom-up approach complements methods, will value both technology (IT) professionals an operational guide, researchers basis future research field.

Язык: Английский

Процитировано

3

Cybersecurity in smart agriculture: A systematic literature review DOI Creative Commons
Milton Campoverde‐Molina, Sergio Luján‐Mora

Computers & Security, Год журнала: 2024, Номер unknown, С. 104284 - 104284

Опубликована: Дек. 1, 2024

Язык: Английский

Процитировано

3

Artificial Intelligence Probabilities Scheme for Disease Prevention Data Set Construction in Intelligent Smart Healthcare Scenario DOI Creative Commons

B. RaviKrishna,

Mohammed E. Seno,

Mohan Raparthi

и другие.

SLAS TECHNOLOGY, Год журнала: 2024, Номер 29(4), С. 100164 - 100164

Опубликована: Июль 20, 2024

In the face of an aging population, smart healthcare services are now within reach, thanks to proliferation high-speed internet and other forms digital technology. Data problems in healthcare, unfortunately, put artificial intelligence this area serious limitations. There several issues, including a lack standard samples, noisy data interference, actual that is missing. A three-stage AI-based generating strategy suggested handle missing datasets, using small sample dataset obtained from program community specific city: Step one involves dataset's basic attributes tree-based generation takes original distribution into account. two Naive Bayes algorithm create indicators behavioural capability assessment for samples. three builds on stage uses multivariate linear regression method evaluation criteria high-level capability. Six involving multiple classifications tasks labels implemented various neural network-based training strategies assess usefulness downstream tasks. To ensure collected genuine useful, experimental must be analysed expert knowledge included.

Язык: Английский

Процитировано

2

Cybersecurity Threats and Mitigation Measures in Agriculture 4.0 and 5.0 DOI Creative Commons
Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G. Arvanitis

и другие.

Smart Agricultural Technology, Год журнала: 2024, Номер unknown, С. 100616 - 100616

Опубликована: Окт. 1, 2024

Язык: Английский

Процитировано

2