As healthcare systems transition into an era dominated by quantum technologies, the need to fortify cybersecurity measures to protect sensitive medical data becomes increasingly imperative. This paper navigates the intricate landscape of post-quantum cryptographic approaches and emerging threats specific to the healthcare sector. Delving into encryption protocols such as lattice-based, code-based, hash-based, and multivariate polynomial cryptography, the paper addresses challenges in adoption and compatibility within healthcare systems.
View Article and Find Full Text PDFThe article discusses the need for a lightweight software architecture evaluation framework that can address practitioners' concerns. Specifically, the proposed framework uses process mining and Petri nets to analyze security and performance in software development's early and late stages. Moreover, the framework has been implemented in six case studies, and the results show that it is a feasible and effective solution that can detect security and performance issues in complex and heterogeneous architecture with less time and effort.
View Article and Find Full Text PDFAgriculture is a leading sector in international initiatives to mitigate climate change and promote sustainability. This article exhaustively examines the removals and emissions of greenhouse gases (GHGs) in the agriculture industry. It also investigates an extensive range of GHG sources, including rice cultivation, enteric fermentation in livestock, and synthetic fertilisers and manure management.
View Article and Find Full Text PDFThe Internet of Things (IoT) is a telecommunication network in the next generation of applications with the rapid progress of wireless sensor network techniques that have touched many spheres of life today. Hardware, telephony, communications, storage, secure platforms, software and services, and data processing platforms are all part of the IoT environment. IoT sensors collect data from their environment and share it by connecting to the Internet gateway.
View Article and Find Full Text PDF