Journal articles on the topic 'SECURING INDUSTRIAL IOT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SECURING INDUSTRIAL IOT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Chien-Ying, Monowar Hasan, and Sibin Mohan. "Securing Real-Time Internet-of-Things." Sensors 18, no. 12 (December 10, 2018): 4356. http://dx.doi.org/10.3390/s18124356.
Full textDhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.
Full textMahmood, Mohammed, and Jassim Abdul-Jabbar. "Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions." Al-Rafidain Engineering Journal (AREJ) 28, no. 1 (March 1, 2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.
Full textGeorge, Gemini, and Sabu M. Thampi. "A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations." IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.
Full textDakhnovich, A. D., D. A. Moskvin, and D. P. Zegzhda. "Approach for Securing Network Communications Modelling Based on Smart Multipath Routing." Nonlinear Phenomena in Complex Systems 23, no. 4 (December 4, 2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.
Full textYas, Harith, and Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network." Journal of Cybersecurity and Information Management 1, no. 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Full textKurdi, Hassan, and Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT." Applied Sciences 12, no. 14 (July 16, 2022): 7173. http://dx.doi.org/10.3390/app12147173.
Full textElkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera, and Ahameed A. Badawy. "Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (January 31, 2022): 1–28. http://dx.doi.org/10.1145/3468064.
Full textKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (June 23, 2021): 5841. http://dx.doi.org/10.3390/app11135841.
Full textJuma, Mazen, Fuad AlAttar, and Basim Touqan. "Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)." IoT 4, no. 1 (February 6, 2023): 27–55. http://dx.doi.org/10.3390/iot4010002.
Full textHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, and Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (April 26, 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Full textPlaga, Sven, Norbert Wiedermann, Simon Duque Anton, Stefan Tatschner, Hans Schotten, and Thomas Newe. "Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions." Future Generation Computer Systems 93 (April 2019): 596–608. http://dx.doi.org/10.1016/j.future.2018.11.008.
Full textZahid, Huma, Sadaf Hina, Muhammad Faisal Hayat, and Ghalib A. Shah. "Agentless Approach for Security Information and Event Management in Industrial IoT." Electronics 12, no. 8 (April 12, 2023): 1831. http://dx.doi.org/10.3390/electronics12081831.
Full textYankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Full textKolhar, Manjur, and Sultan Mesfer Aldossary. "A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks." Designs 7, no. 6 (December 1, 2023): 139. http://dx.doi.org/10.3390/designs7060139.
Full textHasan, Ahmad, Muazzam A. Khan, Balawal Shabir, Arslan Munir, Asad Waqar Malik, Zahid Anwar, and Jawad Ahmad. "Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things." Applied Sciences 12, no. 22 (November 11, 2022): 11442. http://dx.doi.org/10.3390/app122211442.
Full textKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou, and Panagiotis Sarigiannidis. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization." Sensors 21, no. 20 (October 11, 2021): 6743. http://dx.doi.org/10.3390/s21206743.
Full textPal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (October 10, 2021): 9393. http://dx.doi.org/10.3390/app11209393.
Full textBurange, Anup W., and Vaishali M. Deshmukh. "Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (September 1, 2023): 14–22. http://dx.doi.org/10.17762/ijritcc.v11i7.7788.
Full textSharma, Parjanay, Siddhant Jain, Shashank Gupta, and Vinay Chamola. "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications." Ad Hoc Networks 123 (December 2021): 102685. http://dx.doi.org/10.1016/j.adhoc.2021.102685.
Full textElsisi, Mahmoud, Karar Mahmoud, Matti Lehtonen, and Mohamed M. F. Darwish. "Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters." Sensors 21, no. 2 (January 12, 2021): 487. http://dx.doi.org/10.3390/s21020487.
Full textMudassir, Mohammed, Devrim Unal, Mohammad Hammoudeh, and Farag Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches." Wireless Communications and Mobile Computing 2022 (May 17, 2022): 1–12. http://dx.doi.org/10.1155/2022/2845446.
Full textAlharbi, Muhammad H., and Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication." International Journal of Reliability, Quality and Safety Engineering 27, no. 05 (March 23, 2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Full textIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel, and Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications." Electronics 10, no. 8 (April 16, 2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Full textChaudhary, Gopal, Smriti Srivastava, and Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." International Journal of Wireless and Ad Hoc Communication 5, no. 2 (2022): 19–34. http://dx.doi.org/10.54216/ijwac.050202.
Full textChaudhary, Gopal, Smriti Srivastava, and Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." International Journal of Wireless and Ad Hoc Communication 6, no. 1 (2023): 38–49. http://dx.doi.org/10.54216/ijwac.060104.
Full textKarthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Full textHuda, Shamsul, John Yearwood, Mohammad Mehedi Hassan, and Ahmad Almogren. "Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks." Applied Soft Computing 71 (October 2018): 66–77. http://dx.doi.org/10.1016/j.asoc.2018.06.017.
Full textMuridzi, Gibson. "Implication of internet of things (IoT) on organisational performance for SMEs in emerging economies – a systematic review." Technology audit and production reserves 6, no. 4(74) (December 2, 2023): 27–35. http://dx.doi.org/10.15587/2706-5448.2023.292183.
Full textPreuveneers, Davy, Wouter Joosen, and Elisabeth Ilie-Zudor. "Trustworthy data-driven networked production for customer-centric plants." Industrial Management & Data Systems 117, no. 10 (December 4, 2017): 2305–24. http://dx.doi.org/10.1108/imds-10-2016-0419.
Full textCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (December 17, 2023): 9886. http://dx.doi.org/10.3390/s23249886.
Full textCharmanas, Konstantinos, Konstantinos Georgiou, Nikolaos Mittas, and Lefteris Angelis. "Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications." Computers 12, no. 10 (October 20, 2023): 211. http://dx.doi.org/10.3390/computers12100211.
Full textKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Full text.., Anil Audumbar, Saurabh .., Hemachandran .., Shraddhesh Gadilkar, Zakka Benisemeni Esther, Ganesh Shivaji Pise, and Jude Imuede. "Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage." Journal of Cybersecurity and Information Management 13, no. 1 (2024): 46–59. http://dx.doi.org/10.54216/jcim.130105.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textTarrés-Puertas, Marta I., Lluís Brosa, Albert Comerma, Josep M. Rossell, and Antonio D. Dorado. "Architecting an Open-Source IIoT Framework for Real-Time Control and Monitoring in the Bioleaching Industry." Applied Sciences 14, no. 1 (December 29, 2023): 350. http://dx.doi.org/10.3390/app14010350.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textShevtsov, Vadim, and Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts." NBI Technologies, no. 3 (March 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Full textAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (June 15, 2023): 2710. http://dx.doi.org/10.3390/math11122710.
Full textKant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Full textBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin, and Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (November 7, 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Full textFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad, and Imran Ashraf. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry." Sensors 23, no. 21 (November 3, 2023): 8958. http://dx.doi.org/10.3390/s23218958.
Full textAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (August 28, 2023): 7470. http://dx.doi.org/10.3390/s23177470.
Full textVarga, Pal, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz, and Laszlo Toka. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps." Sensors 20, no. 3 (February 4, 2020): 828. http://dx.doi.org/10.3390/s20030828.
Full textAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman, and Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network." Sustainability 15, no. 11 (June 2, 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Full textVijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Full textUllah, Insaf, Ali Alkhalifah, Maha M. Althobaiti, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Muhammad Asghar Khan, and Jimmy Ming-Tai Wu. "Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–8. http://dx.doi.org/10.1155/2022/7336279.
Full textDwivedi, Sanjeev Kumar, Priyadarshini Roy, Chinky Karda, Shalini Agrawal, and Ruhul Amin. "Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey." Security and Communication Networks 2021 (August 23, 2021): 1–21. http://dx.doi.org/10.1155/2021/7142048.
Full textEssop, Ismael, José C. Ribeiro, Maria Papaioannou, Georgios Zachos, Georgios Mantas, and Jonathan Rodriguez. "Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks." Sensors 21, no. 4 (February 23, 2021): 1528. http://dx.doi.org/10.3390/s21041528.
Full textMa, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Full text