Journal articles on the topic 'Security of IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (April 1, 2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textKotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textAlkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Full textAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (June 15, 2023): 2710. http://dx.doi.org/10.3390/math11122710.
Full textMa, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Full textSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Full textUsman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris, and Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS." International Journal of Software Engineering and Computer Systems 9, no. 2 (July 29, 2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.
Full textNurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era." Journal Informatic, Education and Management (JIEM) 5, no. 1 (February 13, 2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.
Full textAl Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Full textMashiya Afroze F and Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (February 23, 2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.
Full textMasyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (June 30, 2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (February 9, 2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textArat, Ferhat, and Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT." PeerJ Computer Science 9 (December 8, 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.
Full textGiaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "IoT Security Configurability with Security-by-Contract." Sensors 19, no. 19 (September 23, 2019): 4121. http://dx.doi.org/10.3390/s19194121.
Full textKant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Full textHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, and Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (April 26, 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Full textBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (October 29, 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textChen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (May 2021): 1–36. http://dx.doi.org/10.1145/3447625.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textZaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.
Full textAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (August 28, 2023): 7470. http://dx.doi.org/10.3390/s23177470.
Full textBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin, and Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (November 7, 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Full textB, Shreya. "Blockchain in IOT Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1074–77. http://dx.doi.org/10.22214/ijraset.2024.59962.
Full textTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Full textTiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 18, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Full textkumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (November 10, 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Full textSchiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, and Burkhard Stiller. "Landscape of IoT security." Computer Science Review 44 (May 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.
Full textADASCALITEI, Ioan. "Smartphones and IoT Security." Informatica Economica 23, no. 2/2019 (June 30, 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.
Full textMoos, James. "IoT, Malware and Security." ITNOW 59, no. 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.
Full textBuenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Full textWOOD, NICK. "RF AND IOT SECURITY." New Electronics 55, no. 3 (March 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.
Full textMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Full textAbdulghani, Hezam Akram, Anastasija Collen, and Niels Alexander Nijdam. "Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity." Sensors 23, no. 8 (April 21, 2023): 4174. http://dx.doi.org/10.3390/s23084174.
Full textMrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Full textFatima, Haram, Habib Ullah Khan, and Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues." Security and Communication Networks 2021 (November 28, 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.
Full textChoudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Full textHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali, and Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework." Eastern-European Journal of Enterprise Technologies 6, no. 9 (120) (December 30, 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Full textShevtsov, Vadim, and Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts." NBI Technologies, no. 3 (March 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Full textM. Sultan, Mohammed. "Securing the internet of things: challenges, strategies, and emerging trends in IoT Security Systems." International Journal of Research in Engineering and Innovation 07, no. 06 (2023): 266–73. http://dx.doi.org/10.36037/ijrei.2023.7607.
Full textMalge, Sunilkumar, and Pallavi Singh. "Internet of Things IoT: Security Perspective." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.
Full textFedrik, Dr E. J. Thomson, A. Vinitha, and B. Vanitha. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.
Full textAwad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.
Full textH.J., Felcia Bel, and Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures." Webology 19, no. 1 (January 20, 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.
Full textIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (July 28, 2021): 5122. http://dx.doi.org/10.3390/s21155122.
Full text