Related references
Note: Only part of the references are listed.Have farmers had enough of experts?
Niki A. Rust et al.
ENVIRONMENTAL MANAGEMENT (2022)
A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges
Xing Yang et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)
Human factor, a critical weak point in the information security of an organization's Internet of things
Kwesi Hughes-Lartey et al.
HELIYON (2021)
Proposing a sparse representational based face verification system to run in a shortage of memory
Seyed Mehdi Hazrati Fard et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2020)
Beyond Zero Trust: Trust Is a Vulnerability
Mark Campbell
COMPUTER (2020)
A survey of machine learning-based solutions to protect privacy in the Internet of Things
Mohammad Amiri-Zarandi et al.
COMPUTERS & SECURITY (2020)
Systematic literature review of implementations of precision agriculture
Isabel Cisternas et al.
COMPUTERS AND ELECTRONICS IN AGRICULTURE (2020)
Requirements for cybersecurity in agricultural communication networks
Jussi Nikander et al.
COMPUTERS AND ELECTRONICS IN AGRICULTURE (2020)
Cybersecurity for Smart Farming: Socio-Cultural Context Matters
Dirk van der Linden et al.
IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2020)
Blockchain Technology for Agriculture: Applications and Rationale
Hang Xiong et al.
FRONTIERS IN BLOCKCHAIN (2020)
Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices
Sara N. Matheu-Garcia et al.
COMPUTER STANDARDS & INTERFACES (2019)
Reference Architectures for Security-by-design IoT: Comparative Study
Valentin Vallois et al.
PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV) (2019)
An exploratory study of cyber hygiene behaviors and knowledge
Ashley A. Cain et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
A Prediction Model Framework for Cyber-Attacks to Precision Agriculture Technologies
Jason West
JOURNAL OF AGRICULTURAL & FOOD INFORMATION (2018)
Multi-Factor Authentication: A Survey
Aleksandr Ometov et al.
CRYPTOGRAPHY (2018)
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
Jaewoo Choi et al.
IEEE SYSTEMS JOURNAL (2017)
Enterprise data breach: causes, challenges, prevention, and future directions
Long Cheng et al.
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2017)
Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
Bartlomiej Hanus et al.
INFORMATION SYSTEMS MANAGEMENT (2016)
A survey on data leakage prevention systems
Sultan Alneyadi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Information security investment for competitive firms with hacker behavior and security requirements
Xing Gao et al.
ANNALS OF OPERATIONS RESEARCH (2015)