Artículos de revistas sobre el tema "Security IoT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security IoT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jogdand, Gopal, Shubham Kadam, Kiran Patil y Gaurav Mate. "Iot Transaction Security". Journal of Advances and Scholarly Researches in Allied Education 15, n.º 2 (1 de abril de 2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Texto completoAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan y Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, n.º 11 (24 de mayo de 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Texto completoToka, K. O., Y. Dikilitaş, T. Oktay y A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23 de diciembre de 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Texto completoRaimundo, Ricardo Jorge y Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, n.º 3 (2 de febrero de 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Texto completoSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich y Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy". ACADEMICIA: An International Multidisciplinary Research Journal 11, n.º 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Texto completoMa, Jinnan, Xuekui Shangguan y Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Texto completoAl Reshan, Mana Saleh. "IoT-based Application of Information Security Triad". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 24 (21 de diciembre de 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Texto completoLi, Yunfa, Yifei Tu, Jiawa Lu y Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things". Sensors 20, n.º 3 (9 de febrero de 2020): 916. http://dx.doi.org/10.3390/s20030916.
Texto completoPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis y Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns". Applied Sciences 11, n.º 4 (4 de febrero de 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Texto completoKant, Daniel, Andreas Johannsen y Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Texto completoGiaretta, Alberto, Nicola Dragoni y Fabio Massacci. "IoT Security Configurability with Security-by-Contract". Sensors 19, n.º 19 (23 de septiembre de 2019): 4121. http://dx.doi.org/10.3390/s19194121.
Texto completoChen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan y Hong-Linh Truong. "IoT Cloud Security Review". ACM Computing Surveys 54, n.º 4 (mayo de 2021): 1–36. http://dx.doi.org/10.1145/3447625.
Texto completoHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia y Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment". Sensors 21, n.º 9 (26 de abril de 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Texto completoBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček y Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques". Electronics 10, n.º 21 (29 de octubre de 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Texto completoYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed y Craig Valli. "Biometrics for Internet-of-Things Security: A Review". Sensors 21, n.º 18 (14 de septiembre de 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Texto completoChoi, Ye-Jin, Hee-Jung Kang y Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity". Electronics 8, n.º 7 (3 de julio de 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Texto completokumar, Abhinav. "IOT Security with Blockchain". YMER Digital 20, n.º 11 (10 de noviembre de 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Texto completoSchiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen y Burkhard Stiller. "Landscape of IoT security". Computer Science Review 44 (mayo de 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.
Texto completoADASCALITEI, Ioan. "Smartphones and IoT Security". Informatica Economica 23, n.º 2/2019 (30 de junio de 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.
Texto completoMoos, James. "IoT, Malware and Security". ITNOW 59, n.º 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.
Texto completoBuenrostro, Erick, Daniel Cyrus, Tra Le y Vahid Emamian. "Security of IoT Devices". Journal of Cyber Security Technology 2, n.º 1 (2 de enero de 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Texto completoWOOD, NICK. "RF AND IOT SECURITY". New Electronics 55, n.º 3 (marzo de 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.
Texto completoBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin y Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices". Sustainability 14, n.º 21 (7 de noviembre de 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Texto completoRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi y Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation". Mathematical Problems in Engineering 2021 (8 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Texto completoHang, Feilu, Linjiang Xie, Zhenhong Zhang, Wei Guo y Hanruo Li. "Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities". International Journal of Information Security and Privacy 16, n.º 2 (1 de abril de 2022): 1–19. http://dx.doi.org/10.4018/ijisp.308315.
Texto completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n.º 1 (20 de enero de 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Texto completoMrabet, Hichem, Sana Belguith, Adeeb Alhomoud y Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis". Sensors 20, n.º 13 (28 de junio de 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Texto completoFatima, Haram, Habib Ullah Khan y Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues". Security and Communication Networks 2021 (28 de noviembre de 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.
Texto completoHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali y Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, n.º 9 (120) (30 de diciembre de 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Texto completoMalge, Sunilkumar y Pallavi Singh. "Internet of Things IoT: Security Perspective". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.
Texto completoFedrik, Dr E. J. Thomson, A. Vinitha y B. Vanitha. "Review on Vulnerabilities of IoT Security". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.
Texto completoChoudhary, Yash, B. Umamaheswari y Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective". Shanlax International Journal of Arts, Science and Humanities 8, n.º 4 (1 de abril de 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Texto completoShevtsov, Vadim y Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts". NBI Technologies, n.º 3 (marzo de 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Texto completoAwad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي". Journal of engineering sciences and information technology 5, n.º 3 (30 de septiembre de 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.
Texto completoH.J., Felcia Bel y Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures". Webology 19, n.º 1 (20 de enero de 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.
Texto completoWu, Qi Wu y Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things". Applied Mechanics and Materials 241-244 (diciembre de 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.
Texto completoEmbarak, Ossama H., Maryam J. Almesmari y Fatima R. Aldarmaki. "Apply Neutrosophic AHP Analysis of the Internet of Things (IoT) and the Internet of Behavior (IoB) in Smart Education". International Journal of Neutrosophic Science 19, n.º 1 (2022): 200–211. http://dx.doi.org/10.54216/ijns.190115.
Texto completoIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau y Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction". Sensors 21, n.º 15 (28 de julio de 2021): 5122. http://dx.doi.org/10.3390/s21155122.
Texto completoObaidat, Muath A., Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh y Joseph Brown. "A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures". Computers 9, n.º 2 (30 de mayo de 2020): 44. http://dx.doi.org/10.3390/computers9020044.
Texto completoMurthy, A. V. V. S. y Reddy P. Vasudeva. "Application of mathematics in design of group key management method". i-manager’s Journal on Mathematics 11, n.º 1 (2022): 31. http://dx.doi.org/10.26634/jmat.11.1.18502.
Texto completoPetrenko, Sergei. "Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns". Voprosy kiberbezopasnosti, n.º 2(42) (2021): 81–91. http://dx.doi.org/10.21681/2311-3456-2021-2-81-91.
Texto completoJin Ho Park, Jin Ho Park, Sushil Kumar Singh Jin Ho Park, Mikail Mohammed Salim Sushil Kumar Singh, Abir EL Azzaoui Mikail Mohammed Salim y Jong Hyuk Park Abir EL Azzaoui. "Ransomware-based Cyber Attacks: A Comprehensive Survey". 網際網路技術學刊 23, n.º 7 (diciembre de 2022): 1557–64. http://dx.doi.org/10.53106/160792642022122307010.
Texto completoKavianpour, Sanaz, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy y Friso De Boer. "A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices". Journal of Computer Networks and Communications 2019 (29 de agosto de 2019): 1–14. http://dx.doi.org/10.1155/2019/5747136.
Texto completoKhelf, Roumaissa, Nacira Ghoualmi-Zine y Marwa Ahmim. "TAKE-IoT". International Journal of Embedded and Real-Time Communication Systems 11, n.º 3 (julio de 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.
Texto completoMohammed Saleem Kurda, Reben, Umran Abdullah Haje, Muhamad Hussein Abdulla y Zhwan Mohammed Khalid. "A Review on Security and Privacy Issues in IoT Devices". Academic Journal of Nawroz University 10, n.º 4 (11 de enero de 2022): 192–205. http://dx.doi.org/10.25007/ajnu.v10n4a1245.
Texto completoVijayakumaran, C., B. Muthusenthil y B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 1 (1 de febrero de 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Texto completoAhmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems". International Journal of Innovative Computing 11, n.º 2 (31 de octubre de 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.
Texto completoPal, Shantanu, Michael Hitchens, Tahiry Rabehaja y Subhas Mukhopadhyay. "Security Requirements for the Internet of Things: A Systematic Approach". Sensors 20, n.º 20 (19 de octubre de 2020): 5897. http://dx.doi.org/10.3390/s20205897.
Texto completoLi, Shancang, Theo Tryfonas y Honglei Li. "The Internet of Things: a security point of view". Internet Research 26, n.º 2 (4 de abril de 2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.
Texto completoYue, Yawei, Shancang Li, Phil Legg y Fuzhong Li. "Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey". Security and Communication Networks 2021 (8 de enero de 2021): 1–13. http://dx.doi.org/10.1155/2021/8873195.
Texto completo