Artykuły w czasopismach na temat „SECURING INDUSTRIAL IOT”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SECURING INDUSTRIAL IOT”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Chen, Chien-Ying, Monowar Hasan i Sibin Mohan. "Securing Real-Time Internet-of-Things". Sensors 18, nr 12 (10.12.2018): 4356. http://dx.doi.org/10.3390/s18124356.
Pełny tekst źródłaDhirani, Lubna Luxmi, Eddie Armstrong i Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap". Sensors 21, nr 11 (5.06.2021): 3901. http://dx.doi.org/10.3390/s21113901.
Pełny tekst źródłaMahmood, Mohammed, i Jassim Abdul-Jabbar. "Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions". Al-Rafidain Engineering Journal (AREJ) 28, nr 1 (1.03.2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.
Pełny tekst źródłaGeorge, Gemini, i Sabu M. Thampi. "A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations". IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.
Pełny tekst źródłaDakhnovich, A. D., D. A. Moskvin i D. P. Zegzhda. "Approach for Securing Network Communications Modelling Based on Smart Multipath Routing". Nonlinear Phenomena in Complex Systems 23, nr 4 (4.12.2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.
Pełny tekst źródłaYas, Harith, i Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network". Journal of Cybersecurity and Information Management 1, nr 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Pełny tekst źródłaKurdi, Hassan, i Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT". Applied Sciences 12, nr 14 (16.07.2022): 7173. http://dx.doi.org/10.3390/app12147173.
Pełny tekst źródłaElkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera i Ahameed A. Badawy. "Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage". ACM Journal on Emerging Technologies in Computing Systems 18, nr 1 (31.01.2022): 1–28. http://dx.doi.org/10.1145/3468064.
Pełny tekst źródłaKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz i Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications". Applied Sciences 11, nr 13 (23.06.2021): 5841. http://dx.doi.org/10.3390/app11135841.
Pełny tekst źródłaJuma, Mazen, Fuad AlAttar i Basim Touqan. "Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)". IoT 4, nr 1 (6.02.2023): 27–55. http://dx.doi.org/10.3390/iot4010002.
Pełny tekst źródłaHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia i Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment". Sensors 21, nr 9 (26.04.2021): 3025. http://dx.doi.org/10.3390/s21093025.
Pełny tekst źródłaPlaga, Sven, Norbert Wiedermann, Simon Duque Anton, Stefan Tatschner, Hans Schotten i Thomas Newe. "Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions". Future Generation Computer Systems 93 (kwiecień 2019): 596–608. http://dx.doi.org/10.1016/j.future.2018.11.008.
Pełny tekst źródłaZahid, Huma, Sadaf Hina, Muhammad Faisal Hayat i Ghalib A. Shah. "Agentless Approach for Security Information and Event Management in Industrial IoT". Electronics 12, nr 8 (12.04.2023): 1831. http://dx.doi.org/10.3390/electronics12081831.
Pełny tekst źródłaYankson, Benjamin, Tyler Loucks, Andrea Sampson i Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools". International Conference on Cyber Warfare and Security 18, nr 1 (28.02.2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Pełny tekst źródłaKolhar, Manjur, i Sultan Mesfer Aldossary. "A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks". Designs 7, nr 6 (1.12.2023): 139. http://dx.doi.org/10.3390/designs7060139.
Pełny tekst źródłaHasan, Ahmad, Muazzam A. Khan, Balawal Shabir, Arslan Munir, Asad Waqar Malik, Zahid Anwar i Jawad Ahmad. "Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things". Applied Sciences 12, nr 22 (11.11.2022): 11442. http://dx.doi.org/10.3390/app122211442.
Pełny tekst źródłaKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou i Panagiotis Sarigiannidis. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization". Sensors 21, nr 20 (11.10.2021): 6743. http://dx.doi.org/10.3390/s21206743.
Pełny tekst źródłaPal, Shantanu, i Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things". Applied Sciences 11, nr 20 (10.10.2021): 9393. http://dx.doi.org/10.3390/app11209393.
Pełny tekst źródłaBurange, Anup W., i Vaishali M. Deshmukh. "Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 7 (1.09.2023): 14–22. http://dx.doi.org/10.17762/ijritcc.v11i7.7788.
Pełny tekst źródłaSharma, Parjanay, Siddhant Jain, Shashank Gupta i Vinay Chamola. "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications". Ad Hoc Networks 123 (grudzień 2021): 102685. http://dx.doi.org/10.1016/j.adhoc.2021.102685.
Pełny tekst źródłaElsisi, Mahmoud, Karar Mahmoud, Matti Lehtonen i Mohamed M. F. Darwish. "Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters". Sensors 21, nr 2 (12.01.2021): 487. http://dx.doi.org/10.3390/s21020487.
Pełny tekst źródłaMudassir, Mohammed, Devrim Unal, Mohammad Hammoudeh i Farag Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches". Wireless Communications and Mobile Computing 2022 (17.05.2022): 1–12. http://dx.doi.org/10.1155/2022/2845446.
Pełny tekst źródłaAlharbi, Muhammad H., i Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication". International Journal of Reliability, Quality and Safety Engineering 27, nr 05 (23.03.2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Pełny tekst źródłaIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel i Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications". Electronics 10, nr 8 (16.04.2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Pełny tekst źródłaChaudhary, Gopal, Smriti Srivastava i Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats". International Journal of Wireless and Ad Hoc Communication 5, nr 2 (2022): 19–34. http://dx.doi.org/10.54216/ijwac.050202.
Pełny tekst źródłaChaudhary, Gopal, Smriti Srivastava i Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats". International Journal of Wireless and Ad Hoc Communication 6, nr 1 (2023): 38–49. http://dx.doi.org/10.54216/ijwac.060104.
Pełny tekst źródłaKarthik, M., i M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism". International Journal of Intelligent Engineering and Systems 14, nr 1 (28.02.2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Pełny tekst źródłaHuda, Shamsul, John Yearwood, Mohammad Mehedi Hassan i Ahmad Almogren. "Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks". Applied Soft Computing 71 (październik 2018): 66–77. http://dx.doi.org/10.1016/j.asoc.2018.06.017.
Pełny tekst źródłaMuridzi, Gibson. "Implication of internet of things (IoT) on organisational performance for SMEs in emerging economies – a systematic review". Technology audit and production reserves 6, nr 4(74) (2.12.2023): 27–35. http://dx.doi.org/10.15587/2706-5448.2023.292183.
Pełny tekst źródłaPreuveneers, Davy, Wouter Joosen i Elisabeth Ilie-Zudor. "Trustworthy data-driven networked production for customer-centric plants". Industrial Management & Data Systems 117, nr 10 (4.12.2017): 2305–24. http://dx.doi.org/10.1108/imds-10-2016-0419.
Pełny tekst źródłaCultice, Tyler, Joseph Clark, Wu Yang i Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World". Sensors 23, nr 24 (17.12.2023): 9886. http://dx.doi.org/10.3390/s23249886.
Pełny tekst źródłaCharmanas, Konstantinos, Konstantinos Georgiou, Nikolaos Mittas i Lefteris Angelis. "Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications". Computers 12, nr 10 (20.10.2023): 211. http://dx.doi.org/10.3390/computers12100211.
Pełny tekst źródłaKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam i Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices". Security and Communication Networks 2022 (25.05.2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Pełny tekst źródła.., Anil Audumbar, Saurabh .., Hemachandran .., Shraddhesh Gadilkar, Zakka Benisemeni Esther, Ganesh Shivaji Pise i Jude Imuede. "Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage". Journal of Cybersecurity and Information Management 13, nr 1 (2024): 46–59. http://dx.doi.org/10.54216/jcim.130105.
Pełny tekst źródłaAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan i Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, nr 11 (24.05.2021): 3654. http://dx.doi.org/10.3390/s21113654.
Pełny tekst źródłaTarrés-Puertas, Marta I., Lluís Brosa, Albert Comerma, Josep M. Rossell i Antonio D. Dorado. "Architecting an Open-Source IIoT Framework for Real-Time Control and Monitoring in the Bioleaching Industry". Applied Sciences 14, nr 1 (29.12.2023): 350. http://dx.doi.org/10.3390/app14010350.
Pełny tekst źródłaRaimundo, Ricardo Jorge, i Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, nr 3 (2.02.2022): 1598. http://dx.doi.org/10.3390/app12031598.
Pełny tekst źródłaShevtsov, Vadim, i Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts". NBI Technologies, nr 3 (marzec 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Pełny tekst źródłaAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things". Mathematics 11, nr 12 (15.06.2023): 2710. http://dx.doi.org/10.3390/math11122710.
Pełny tekst źródłaKant, Daniel, Andreas Johannsen i Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, nr 3 (18.06.2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Pełny tekst źródłaBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin i Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices". Sustainability 14, nr 21 (7.11.2022): 14645. http://dx.doi.org/10.3390/su142114645.
Pełny tekst źródłaFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad i Imran Ashraf. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry". Sensors 23, nr 21 (3.11.2023): 8958. http://dx.doi.org/10.3390/s23218958.
Pełny tekst źródłaAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities". Sensors 23, nr 17 (28.08.2023): 7470. http://dx.doi.org/10.3390/s23177470.
Pełny tekst źródłaVarga, Pal, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz i Laszlo Toka. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps". Sensors 20, nr 3 (4.02.2020): 828. http://dx.doi.org/10.3390/s20030828.
Pełny tekst źródłaAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman i Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, nr 11 (2.06.2023): 9001. http://dx.doi.org/10.3390/su15119001.
Pełny tekst źródłaVijayakumaran, C., B. Muthusenthil i B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 1 (1.02.2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Pełny tekst źródłaUllah, Insaf, Ali Alkhalifah, Maha M. Althobaiti, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Muhammad Asghar Khan i Jimmy Ming-Tai Wu. "Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography". Wireless Communications and Mobile Computing 2022 (8.02.2022): 1–8. http://dx.doi.org/10.1155/2022/7336279.
Pełny tekst źródłaDwivedi, Sanjeev Kumar, Priyadarshini Roy, Chinky Karda, Shalini Agrawal i Ruhul Amin. "Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey". Security and Communication Networks 2021 (23.08.2021): 1–21. http://dx.doi.org/10.1155/2021/7142048.
Pełny tekst źródłaEssop, Ismael, José C. Ribeiro, Maria Papaioannou, Georgios Zachos, Georgios Mantas i Jonathan Rodriguez. "Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks". Sensors 21, nr 4 (23.02.2021): 1528. http://dx.doi.org/10.3390/s21041528.
Pełny tekst źródłaMa, Jinnan, Xuekui Shangguan i Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21.08.2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Pełny tekst źródła