Search Results

Now showing 1 - 4 of 4
  • Article
    Citation - WoS: 36
    Agriculture 4.0: an Implementation Framework for Food Security Attainment in Nigeria's Post-Covid Era
    (Ieee-inst Electrical Electronics Engineers inc, 2021) Oruma, Samson O.; Misra, Sanjay; Fernandez-Sanz, Luis
    The challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting agriculture 4.0 and commercial farming. Using data from six digital libraries, the Nigerian Bureau of Statistics, and other internet sources, we conducted a Systematic Literature Review (SLR using PRISMA) on Nigeria's agriculture, food security, and agriculture 4.0. Our results show Nigeria's current agricultural state, threats to food security, and modern digital agriculture technologies. We adapted our SLR findings to develop an implementation framework for agriculture 4.0 in solving Nigeria's food insecurity challenge in the post-Covid-19 era. Our proposed framework integrates precision agriculture in Nigeria's food production and the necessary enabling digital technologies in the agri-food supply chain. We analyzed the critical implementation considerations during each agri-food supply chain stage of farming inputs, farming scale, farming approach, farming operation, food processing, food preservation/storage, distribution/logistics, and the final consumers. This study will help researchers, investors, and the government address food security in Nigeria. The implementation of agriculture 4.0 will substantially contribute to SDG 2 (zero hunger), SDG 3 (good health and well-being), and SDG 8 (decent work and economic growth) of #Envision 2030 of the United Nations, for the benefit of Nigeria, Africa, and the entire world.
  • Article
    Citation - WoS: 75
    Citation - Scopus: 93
    Co-Fais: Cooperative Fuzzy Artificial Immune System for Detecting Intrusion in Wireless Sensor Networks
    (Academic Press Ltd- Elsevier Science Ltd, 2014) Shamshirband, Shahaboddin; Anuar, Nor Badrul; Kiah, Miss Laiha Mat; Rohani, Vala Ali; Petkovic, Dalibor; Misra, Sanjay; Khan, Abdul Nasir
    Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a bio-inspired method is introduced, namely the cooperative-based fuzzy artificial immune system (Co-FATS). It is a modular-based defense strategy derived from the danger theory of the human immune system. The agents synchronize and work with one another to calculate the abnormality of sensor behavior in terms of context antigen value (CAV) or attackers and update the fuzzy activation threshold for security response. In such a multi-node circumstance, the sniffer module adapts to the sink node to audit data by analyzing the packet components and sending the log file to the next layer. The fuzzy misuse detector module (FMDM) integrates with a danger detector module to identify the sources of danger signals. The infected sources are transmitted to the fuzzy Q-learning vaccination modules (FQVM) in order for particular, required action to enhance system abilities. The Cooperative Decision Making Modules (Co-DMM) incorporates danger detector module with the fuzzy Q-learning vaccination module to produce optimum defense strategies. To evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using a network simulator. The model was subsequently compared against other existing soft computing methods, such as fuzzy logic controller (FLC), artificial immune system (AIS), and fuzzy Q-learning (FQL), in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed method improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods. (C) 2014 Elsevier Ltd. All rights reserved.
  • Article
    Citation - WoS: 11
    Citation - Scopus: 24
    The Effect of Social Media User Behaviors on Security and Privacy Threats
    (Ieee-inst Electrical Electronics Engineers inc, 2022) Cengiz, Aslihan Banu; Kalem, Guler; Boluk, Pinar Sarisaray
    The number of online social network (OSN) users is increasing daily and attacks and threats against over the time spent on online networks has been increasing equally. Attacks against OSN users exploit not only system vulnerabilities but also user-induced vulnerabilities, which naturally affect the hacker's attack strategy as well. This study is designed to investigate the effect of social media user behaviors on their vulnerability level in terms of security and privacy. The study was conducted survey methods, which was applied to social media users in two countries - Turkey and Iraq. This study documents and analyzes the behaviors of 700 OSN users in two countries. This study examines the behaviors of social media users from two nationalities, investigating whether there is a relationship between social media users' behaviors and security and privacy threats. Research findings demonstrate that there is a significant relationship between OSN users' behaviors and their attitudes towards security and privacy. Additionally, Turkish social media users pay more attention to their behaviors in terms of privacy and security awareness than Iraq users.
  • Article
    Citation - WoS: 41
    Citation - Scopus: 88
    Attributes Impacting Cybersecurity Policy Development: an Evidence From Seven Nations
    (Elsevier Advanced Technology, 2022) Mishra, Alok; Alzoubi, Yehia Ibrahim; Anwar, Memoona Javeria; Gill, Asif Qumer
    Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effec-tive cybersecurity policies in place to respond to escalating cyber threats. Individual users and corpora-tions are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. Some na-tions seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Identifying the common poli-cies across several nations may assist academics and policymakers in developing cybersecurity policies. A survey of other nations' cybersecurity policies might be included in the future research.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )