Artículos de revistas sobre el tema "Security of IoT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security of IoT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jogdand, Gopal, Shubham Kadam, Kiran Patil y Gaurav Mate. "Iot Transaction Security". Journal of Advances and Scholarly Researches in Allied Education 15, n.º 2 (1 de abril de 2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Texto completoAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan y Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, n.º 11 (24 de mayo de 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Texto completoToka, K. O., Y. Dikilitaş, T. Oktay y A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23 de diciembre de 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Texto completoKotaiah, Dharavath y Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 3 (31 de marzo de 2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Texto completoRaimundo, Ricardo Jorge y Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, n.º 3 (2 de febrero de 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Texto completoAlkunidry, Dona, Shahad Alhuwaysi y Rawan Alharbi. "Security Threads and IoT Security". Journal of Computer and Communications 11, n.º 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Texto completoAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things". Mathematics 11, n.º 12 (15 de junio de 2023): 2710. http://dx.doi.org/10.3390/math11122710.
Texto completoMa, Jinnan, Xuekui Shangguan y Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Texto completoSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich y Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy". ACADEMICIA: An International Multidisciplinary Research Journal 11, n.º 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Texto completoUsman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris y Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS". International Journal of Software Engineering and Computer Systems 9, n.º 2 (29 de julio de 2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.
Texto completoNurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era". Journal Informatic, Education and Management (JIEM) 5, n.º 1 (13 de febrero de 2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.
Texto completoAl Reshan, Mana Saleh. "IoT-based Application of Information Security Triad". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 24 (21 de diciembre de 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Texto completoMashiya Afroze F y Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks". International Research Journal on Advanced Engineering Hub (IRJAEH) 2, n.º 02 (23 de febrero de 2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.
Texto completoMasyhur, Zulkarnaim, Firmansyah Ibrahim y Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures". Journal Software, Hardware and Information Technology 2, n.º 2 (30 de junio de 2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.
Texto completoLi, Yunfa, Yifei Tu, Jiawa Lu y Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things". Sensors 20, n.º 3 (9 de febrero de 2020): 916. http://dx.doi.org/10.3390/s20030916.
Texto completoPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis y Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns". Applied Sciences 11, n.º 4 (4 de febrero de 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Texto completoArat, Ferhat y Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT". PeerJ Computer Science 9 (8 de diciembre de 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.
Texto completoGiaretta, Alberto, Nicola Dragoni y Fabio Massacci. "IoT Security Configurability with Security-by-Contract". Sensors 19, n.º 19 (23 de septiembre de 2019): 4121. http://dx.doi.org/10.3390/s19194121.
Texto completoKant, Daniel, Andreas Johannsen y Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Texto completoHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia y Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment". Sensors 21, n.º 9 (26 de abril de 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Texto completoBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček y Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques". Electronics 10, n.º 21 (29 de octubre de 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Texto completoYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed y Craig Valli. "Biometrics for Internet-of-Things Security: A Review". Sensors 21, n.º 18 (14 de septiembre de 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Texto completoChen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan y Hong-Linh Truong. "IoT Cloud Security Review". ACM Computing Surveys 54, n.º 4 (mayo de 2021): 1–36. http://dx.doi.org/10.1145/3447625.
Texto completoChoi, Ye-Jin, Hee-Jung Kang y Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity". Electronics 8, n.º 7 (3 de julio de 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Texto completoZaher, Mahmoud A. y Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis". Journal of Cybersecurity and Information Management 10, n.º 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.
Texto completoAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities". Sensors 23, n.º 17 (28 de agosto de 2023): 7470. http://dx.doi.org/10.3390/s23177470.
Texto completoBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin y Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices". Sustainability 14, n.º 21 (7 de noviembre de 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Texto completoRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi y Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation". Mathematical Problems in Engineering 2021 (8 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Texto completoB, Shreya. "Blockchain in IOT Security". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 1074–77. http://dx.doi.org/10.22214/ijraset.2024.59962.
Texto completoTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi y Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches". Data and Metadata 2 (30 de diciembre de 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Texto completoTiwari,, Arun. "Security and Privacy Analysis in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (18 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Texto completokumar, Abhinav. "IOT Security with Blockchain". YMER Digital 20, n.º 11 (10 de noviembre de 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Texto completoSchiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen y Burkhard Stiller. "Landscape of IoT security". Computer Science Review 44 (mayo de 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.
Texto completoADASCALITEI, Ioan. "Smartphones and IoT Security". Informatica Economica 23, n.º 2/2019 (30 de junio de 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.
Texto completoMoos, James. "IoT, Malware and Security". ITNOW 59, n.º 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.
Texto completoBuenrostro, Erick, Daniel Cyrus, Tra Le y Vahid Emamian. "Security of IoT Devices". Journal of Cyber Security Technology 2, n.º 1 (2 de enero de 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Texto completoWOOD, NICK. "RF AND IOT SECURITY". New Electronics 55, n.º 3 (marzo de 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.
Texto completoMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n.º 1 (20 de enero de 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Texto completoAbdulghani, Hezam Akram, Anastasija Collen y Niels Alexander Nijdam. "Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity". Sensors 23, n.º 8 (21 de abril de 2023): 4174. http://dx.doi.org/10.3390/s23084174.
Texto completoMrabet, Hichem, Sana Belguith, Adeeb Alhomoud y Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis". Sensors 20, n.º 13 (28 de junio de 2020): 3625. http://dx.doi.org/10.3390/s20133625.
Texto completoFatima, Haram, Habib Ullah Khan y Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues". Security and Communication Networks 2021 (28 de noviembre de 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.
Texto completoChoudhary, Yash, B. Umamaheswari y Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective". Shanlax International Journal of Arts, Science and Humanities 8, n.º 4 (1 de abril de 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Texto completoHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali y Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, n.º 9 (120) (30 de diciembre de 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Texto completoShevtsov, Vadim y Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts". NBI Technologies, n.º 3 (marzo de 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Texto completoM. Sultan, Mohammed. "Securing the internet of things: challenges, strategies, and emerging trends in IoT Security Systems". International Journal of Research in Engineering and Innovation 07, n.º 06 (2023): 266–73. http://dx.doi.org/10.36037/ijrei.2023.7607.
Texto completoMalge, Sunilkumar y Pallavi Singh. "Internet of Things IoT: Security Perspective". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.
Texto completoFedrik, Dr E. J. Thomson, A. Vinitha y B. Vanitha. "Review on Vulnerabilities of IoT Security". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.
Texto completoAwad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي". Journal of engineering sciences and information technology 5, n.º 3 (30 de septiembre de 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.
Texto completoH.J., Felcia Bel y Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures". Webology 19, n.º 1 (20 de enero de 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.
Texto completoIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau y Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction". Sensors 21, n.º 15 (28 de julio de 2021): 5122. http://dx.doi.org/10.3390/s21155122.
Texto completo