Artículos de revistas sobre el tema "SECURING INDUSTRIAL IOT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SECURING INDUSTRIAL IOT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Chen, Chien-Ying, Monowar Hasan y Sibin Mohan. "Securing Real-Time Internet-of-Things". Sensors 18, n.º 12 (10 de diciembre de 2018): 4356. http://dx.doi.org/10.3390/s18124356.
Texto completoDhirani, Lubna Luxmi, Eddie Armstrong y Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap". Sensors 21, n.º 11 (5 de junio de 2021): 3901. http://dx.doi.org/10.3390/s21113901.
Texto completoMahmood, Mohammed y Jassim Abdul-Jabbar. "Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions". Al-Rafidain Engineering Journal (AREJ) 28, n.º 1 (1 de marzo de 2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.
Texto completoGeorge, Gemini y Sabu M. Thampi. "A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations". IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.
Texto completoDakhnovich, A. D., D. A. Moskvin y D. P. Zegzhda. "Approach for Securing Network Communications Modelling Based on Smart Multipath Routing". Nonlinear Phenomena in Complex Systems 23, n.º 4 (4 de diciembre de 2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.
Texto completoYas, Harith y Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network". Journal of Cybersecurity and Information Management 1, n.º 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Texto completoKurdi, Hassan y Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT". Applied Sciences 12, n.º 14 (16 de julio de 2022): 7173. http://dx.doi.org/10.3390/app12147173.
Texto completoElkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera y Ahameed A. Badawy. "Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage". ACM Journal on Emerging Technologies in Computing Systems 18, n.º 1 (31 de enero de 2022): 1–28. http://dx.doi.org/10.1145/3468064.
Texto completoKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz y Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications". Applied Sciences 11, n.º 13 (23 de junio de 2021): 5841. http://dx.doi.org/10.3390/app11135841.
Texto completoJuma, Mazen, Fuad AlAttar y Basim Touqan. "Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)". IoT 4, n.º 1 (6 de febrero de 2023): 27–55. http://dx.doi.org/10.3390/iot4010002.
Texto completoHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia y Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment". Sensors 21, n.º 9 (26 de abril de 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Texto completoPlaga, Sven, Norbert Wiedermann, Simon Duque Anton, Stefan Tatschner, Hans Schotten y Thomas Newe. "Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions". Future Generation Computer Systems 93 (abril de 2019): 596–608. http://dx.doi.org/10.1016/j.future.2018.11.008.
Texto completoZahid, Huma, Sadaf Hina, Muhammad Faisal Hayat y Ghalib A. Shah. "Agentless Approach for Security Information and Event Management in Industrial IoT". Electronics 12, n.º 8 (12 de abril de 2023): 1831. http://dx.doi.org/10.3390/electronics12081831.
Texto completoYankson, Benjamin, Tyler Loucks, Andrea Sampson y Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de febrero de 2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Texto completoKolhar, Manjur y Sultan Mesfer Aldossary. "A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks". Designs 7, n.º 6 (1 de diciembre de 2023): 139. http://dx.doi.org/10.3390/designs7060139.
Texto completoHasan, Ahmad, Muazzam A. Khan, Balawal Shabir, Arslan Munir, Asad Waqar Malik, Zahid Anwar y Jawad Ahmad. "Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things". Applied Sciences 12, n.º 22 (11 de noviembre de 2022): 11442. http://dx.doi.org/10.3390/app122211442.
Texto completoKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou y Panagiotis Sarigiannidis. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization". Sensors 21, n.º 20 (11 de octubre de 2021): 6743. http://dx.doi.org/10.3390/s21206743.
Texto completoPal, Shantanu y Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things". Applied Sciences 11, n.º 20 (10 de octubre de 2021): 9393. http://dx.doi.org/10.3390/app11209393.
Texto completoBurange, Anup W. y Vaishali M. Deshmukh. "Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7 (1 de septiembre de 2023): 14–22. http://dx.doi.org/10.17762/ijritcc.v11i7.7788.
Texto completoSharma, Parjanay, Siddhant Jain, Shashank Gupta y Vinay Chamola. "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications". Ad Hoc Networks 123 (diciembre de 2021): 102685. http://dx.doi.org/10.1016/j.adhoc.2021.102685.
Texto completoElsisi, Mahmoud, Karar Mahmoud, Matti Lehtonen y Mohamed M. F. Darwish. "Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters". Sensors 21, n.º 2 (12 de enero de 2021): 487. http://dx.doi.org/10.3390/s21020487.
Texto completoMudassir, Mohammed, Devrim Unal, Mohammad Hammoudeh y Farag Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches". Wireless Communications and Mobile Computing 2022 (17 de mayo de 2022): 1–12. http://dx.doi.org/10.1155/2022/2845446.
Texto completoAlharbi, Muhammad H. y Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication". International Journal of Reliability, Quality and Safety Engineering 27, n.º 05 (23 de marzo de 2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Texto completoIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel y Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications". Electronics 10, n.º 8 (16 de abril de 2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Texto completoChaudhary, Gopal, Smriti Srivastava y Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats". International Journal of Wireless and Ad Hoc Communication 5, n.º 2 (2022): 19–34. http://dx.doi.org/10.54216/ijwac.050202.
Texto completoChaudhary, Gopal, Smriti Srivastava y Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats". International Journal of Wireless and Ad Hoc Communication 6, n.º 1 (2023): 38–49. http://dx.doi.org/10.54216/ijwac.060104.
Texto completoKarthik, M. y M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism". International Journal of Intelligent Engineering and Systems 14, n.º 1 (28 de febrero de 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Texto completoHuda, Shamsul, John Yearwood, Mohammad Mehedi Hassan y Ahmad Almogren. "Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks". Applied Soft Computing 71 (octubre de 2018): 66–77. http://dx.doi.org/10.1016/j.asoc.2018.06.017.
Texto completoMuridzi, Gibson. "Implication of internet of things (IoT) on organisational performance for SMEs in emerging economies – a systematic review". Technology audit and production reserves 6, n.º 4(74) (2 de diciembre de 2023): 27–35. http://dx.doi.org/10.15587/2706-5448.2023.292183.
Texto completoPreuveneers, Davy, Wouter Joosen y Elisabeth Ilie-Zudor. "Trustworthy data-driven networked production for customer-centric plants". Industrial Management & Data Systems 117, n.º 10 (4 de diciembre de 2017): 2305–24. http://dx.doi.org/10.1108/imds-10-2016-0419.
Texto completoCultice, Tyler, Joseph Clark, Wu Yang y Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World". Sensors 23, n.º 24 (17 de diciembre de 2023): 9886. http://dx.doi.org/10.3390/s23249886.
Texto completoCharmanas, Konstantinos, Konstantinos Georgiou, Nikolaos Mittas y Lefteris Angelis. "Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications". Computers 12, n.º 10 (20 de octubre de 2023): 211. http://dx.doi.org/10.3390/computers12100211.
Texto completoKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam y Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices". Security and Communication Networks 2022 (25 de mayo de 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Texto completo.., Anil Audumbar, Saurabh .., Hemachandran .., Shraddhesh Gadilkar, Zakka Benisemeni Esther, Ganesh Shivaji Pise y Jude Imuede. "Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage". Journal of Cybersecurity and Information Management 13, n.º 1 (2024): 46–59. http://dx.doi.org/10.54216/jcim.130105.
Texto completoAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan y Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, n.º 11 (24 de mayo de 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Texto completoTarrés-Puertas, Marta I., Lluís Brosa, Albert Comerma, Josep M. Rossell y Antonio D. Dorado. "Architecting an Open-Source IIoT Framework for Real-Time Control and Monitoring in the Bioleaching Industry". Applied Sciences 14, n.º 1 (29 de diciembre de 2023): 350. http://dx.doi.org/10.3390/app14010350.
Texto completoRaimundo, Ricardo Jorge y Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, n.º 3 (2 de febrero de 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Texto completoShevtsov, Vadim y Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts". NBI Technologies, n.º 3 (marzo de 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Texto completoAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things". Mathematics 11, n.º 12 (15 de junio de 2023): 2710. http://dx.doi.org/10.3390/math11122710.
Texto completoKant, Daniel, Andreas Johannsen y Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Texto completoBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin y Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices". Sustainability 14, n.º 21 (7 de noviembre de 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Texto completoFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad y Imran Ashraf. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry". Sensors 23, n.º 21 (3 de noviembre de 2023): 8958. http://dx.doi.org/10.3390/s23218958.
Texto completoAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities". Sensors 23, n.º 17 (28 de agosto de 2023): 7470. http://dx.doi.org/10.3390/s23177470.
Texto completoVarga, Pal, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz y Laszlo Toka. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps". Sensors 20, n.º 3 (4 de febrero de 2020): 828. http://dx.doi.org/10.3390/s20030828.
Texto completoAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman y Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, n.º 11 (2 de junio de 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Texto completoVijayakumaran, C., B. Muthusenthil y B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 1 (1 de febrero de 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Texto completoUllah, Insaf, Ali Alkhalifah, Maha M. Althobaiti, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Muhammad Asghar Khan y Jimmy Ming-Tai Wu. "Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography". Wireless Communications and Mobile Computing 2022 (8 de febrero de 2022): 1–8. http://dx.doi.org/10.1155/2022/7336279.
Texto completoDwivedi, Sanjeev Kumar, Priyadarshini Roy, Chinky Karda, Shalini Agrawal y Ruhul Amin. "Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey". Security and Communication Networks 2021 (23 de agosto de 2021): 1–21. http://dx.doi.org/10.1155/2021/7142048.
Texto completoEssop, Ismael, José C. Ribeiro, Maria Papaioannou, Georgios Zachos, Georgios Mantas y Jonathan Rodriguez. "Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks". Sensors 21, n.º 4 (23 de febrero de 2021): 1528. http://dx.doi.org/10.3390/s21041528.
Texto completoMa, Jinnan, Xuekui Shangguan y Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Texto completo