Journal articles on the topic 'Security IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (April 1, 2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Full textMa, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Full textAl Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (February 9, 2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textKant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Full textGiaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "IoT Security Configurability with Security-by-Contract." Sensors 19, no. 19 (September 23, 2019): 4121. http://dx.doi.org/10.3390/s19194121.
Full textChen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (May 2021): 1–36. http://dx.doi.org/10.1145/3447625.
Full textHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, and Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (April 26, 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Full textBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (October 29, 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textkumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (November 10, 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Full textSchiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, and Burkhard Stiller. "Landscape of IoT security." Computer Science Review 44 (May 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.
Full textADASCALITEI, Ioan. "Smartphones and IoT Security." Informatica Economica 23, no. 2/2019 (June 30, 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.
Full textMoos, James. "IoT, Malware and Security." ITNOW 59, no. 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.
Full textBuenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Full textWOOD, NICK. "RF AND IOT SECURITY." New Electronics 55, no. 3 (March 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.
Full textBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin, and Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (November 7, 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Full textHang, Feilu, Linjiang Xie, Zhenhong Zhang, Wei Guo, and Hanruo Li. "Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–19. http://dx.doi.org/10.4018/ijisp.308315.
Full textMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Full textMrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Full textFatima, Haram, Habib Ullah Khan, and Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues." Security and Communication Networks 2021 (November 28, 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.
Full textHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali, and Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework." Eastern-European Journal of Enterprise Technologies 6, no. 9 (120) (December 30, 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Full textMalge, Sunilkumar, and Pallavi Singh. "Internet of Things IoT: Security Perspective." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.
Full textFedrik, Dr E. J. Thomson, A. Vinitha, and B. Vanitha. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.
Full textChoudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Full textShevtsov, Vadim, and Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts." NBI Technologies, no. 3 (March 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Full textAwad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.
Full textH.J., Felcia Bel, and Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures." Webology 19, no. 1 (January 20, 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.
Full textWu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.
Full textEmbarak, Ossama H., Maryam J. Almesmari, and Fatima R. Aldarmaki. "Apply Neutrosophic AHP Analysis of the Internet of Things (IoT) and the Internet of Behavior (IoB) in Smart Education." International Journal of Neutrosophic Science 19, no. 1 (2022): 200–211. http://dx.doi.org/10.54216/ijns.190115.
Full textIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (July 28, 2021): 5122. http://dx.doi.org/10.3390/s21155122.
Full textObaidat, Muath A., Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, and Joseph Brown. "A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures." Computers 9, no. 2 (May 30, 2020): 44. http://dx.doi.org/10.3390/computers9020044.
Full textMurthy, A. V. V. S., and Reddy P. Vasudeva. "Application of mathematics in design of group key management method." i-manager’s Journal on Mathematics 11, no. 1 (2022): 31. http://dx.doi.org/10.26634/jmat.11.1.18502.
Full textPetrenko, Sergei. "Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns." Voprosy kiberbezopasnosti, no. 2(42) (2021): 81–91. http://dx.doi.org/10.21681/2311-3456-2021-2-81-91.
Full textJin Ho Park, Jin Ho Park, Sushil Kumar Singh Jin Ho Park, Mikail Mohammed Salim Sushil Kumar Singh, Abir EL Azzaoui Mikail Mohammed Salim, and Jong Hyuk Park Abir EL Azzaoui. "Ransomware-based Cyber Attacks: A Comprehensive Survey." 網際網路技術學刊 23, no. 7 (December 2022): 1557–64. http://dx.doi.org/10.53106/160792642022122307010.
Full textKavianpour, Sanaz, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, and Friso De Boer. "A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices." Journal of Computer Networks and Communications 2019 (August 29, 2019): 1–14. http://dx.doi.org/10.1155/2019/5747136.
Full textKhelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Full textMohammed Saleem Kurda, Reben, Umran Abdullah Haje, Muhamad Hussein Abdulla, and Zhwan Mohammed Khalid. "A Review on Security and Privacy Issues in IoT Devices." Academic Journal of Nawroz University 10, no. 4 (January 11, 2022): 192–205. http://dx.doi.org/10.25007/ajnu.v10n4a1245.
Full textVijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Full textAhmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.
Full textPal, Shantanu, Michael Hitchens, Tahiry Rabehaja, and Subhas Mukhopadhyay. "Security Requirements for the Internet of Things: A Systematic Approach." Sensors 20, no. 20 (October 19, 2020): 5897. http://dx.doi.org/10.3390/s20205897.
Full textLi, Shancang, Theo Tryfonas, and Honglei Li. "The Internet of Things: a security point of view." Internet Research 26, no. 2 (April 4, 2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.
Full textYue, Yawei, Shancang Li, Phil Legg, and Fuzhong Li. "Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey." Security and Communication Networks 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8873195.
Full text