Статті в журналах з теми "SECURING INDUSTRIAL IOT"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SECURING INDUSTRIAL IOT".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Chen, Chien-Ying, Monowar Hasan, and Sibin Mohan. "Securing Real-Time Internet-of-Things." Sensors 18, no. 12 (December 10, 2018): 4356. http://dx.doi.org/10.3390/s18124356.
Повний текст джерелаDhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.
Повний текст джерелаMahmood, Mohammed, and Jassim Abdul-Jabbar. "Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions." Al-Rafidain Engineering Journal (AREJ) 28, no. 1 (March 1, 2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.
Повний текст джерелаGeorge, Gemini, and Sabu M. Thampi. "A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations." IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.
Повний текст джерелаDakhnovich, A. D., D. A. Moskvin, and D. P. Zegzhda. "Approach for Securing Network Communications Modelling Based on Smart Multipath Routing." Nonlinear Phenomena in Complex Systems 23, no. 4 (December 4, 2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.
Повний текст джерелаYas, Harith, and Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network." Journal of Cybersecurity and Information Management 1, no. 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Повний текст джерелаKurdi, Hassan, and Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT." Applied Sciences 12, no. 14 (July 16, 2022): 7173. http://dx.doi.org/10.3390/app12147173.
Повний текст джерелаElkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera, and Ahameed A. Badawy. "Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (January 31, 2022): 1–28. http://dx.doi.org/10.1145/3468064.
Повний текст джерелаKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (June 23, 2021): 5841. http://dx.doi.org/10.3390/app11135841.
Повний текст джерелаJuma, Mazen, Fuad AlAttar, and Basim Touqan. "Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)." IoT 4, no. 1 (February 6, 2023): 27–55. http://dx.doi.org/10.3390/iot4010002.
Повний текст джерелаHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, and Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (April 26, 2021): 3025. http://dx.doi.org/10.3390/s21093025.
Повний текст джерелаPlaga, Sven, Norbert Wiedermann, Simon Duque Anton, Stefan Tatschner, Hans Schotten, and Thomas Newe. "Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions." Future Generation Computer Systems 93 (April 2019): 596–608. http://dx.doi.org/10.1016/j.future.2018.11.008.
Повний текст джерелаZahid, Huma, Sadaf Hina, Muhammad Faisal Hayat, and Ghalib A. Shah. "Agentless Approach for Security Information and Event Management in Industrial IoT." Electronics 12, no. 8 (April 12, 2023): 1831. http://dx.doi.org/10.3390/electronics12081831.
Повний текст джерелаYankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Повний текст джерелаKolhar, Manjur, and Sultan Mesfer Aldossary. "A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks." Designs 7, no. 6 (December 1, 2023): 139. http://dx.doi.org/10.3390/designs7060139.
Повний текст джерелаHasan, Ahmad, Muazzam A. Khan, Balawal Shabir, Arslan Munir, Asad Waqar Malik, Zahid Anwar, and Jawad Ahmad. "Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things." Applied Sciences 12, no. 22 (November 11, 2022): 11442. http://dx.doi.org/10.3390/app122211442.
Повний текст джерелаKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou, and Panagiotis Sarigiannidis. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization." Sensors 21, no. 20 (October 11, 2021): 6743. http://dx.doi.org/10.3390/s21206743.
Повний текст джерелаPal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (October 10, 2021): 9393. http://dx.doi.org/10.3390/app11209393.
Повний текст джерелаBurange, Anup W., and Vaishali M. Deshmukh. "Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (September 1, 2023): 14–22. http://dx.doi.org/10.17762/ijritcc.v11i7.7788.
Повний текст джерелаSharma, Parjanay, Siddhant Jain, Shashank Gupta, and Vinay Chamola. "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications." Ad Hoc Networks 123 (December 2021): 102685. http://dx.doi.org/10.1016/j.adhoc.2021.102685.
Повний текст джерелаElsisi, Mahmoud, Karar Mahmoud, Matti Lehtonen, and Mohamed M. F. Darwish. "Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters." Sensors 21, no. 2 (January 12, 2021): 487. http://dx.doi.org/10.3390/s21020487.
Повний текст джерелаMudassir, Mohammed, Devrim Unal, Mohammad Hammoudeh, and Farag Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches." Wireless Communications and Mobile Computing 2022 (May 17, 2022): 1–12. http://dx.doi.org/10.1155/2022/2845446.
Повний текст джерелаAlharbi, Muhammad H., and Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication." International Journal of Reliability, Quality and Safety Engineering 27, no. 05 (March 23, 2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Повний текст джерелаIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel, and Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications." Electronics 10, no. 8 (April 16, 2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Повний текст джерелаChaudhary, Gopal, Smriti Srivastava, and Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." International Journal of Wireless and Ad Hoc Communication 5, no. 2 (2022): 19–34. http://dx.doi.org/10.54216/ijwac.050202.
Повний текст джерелаChaudhary, Gopal, Smriti Srivastava, and Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." International Journal of Wireless and Ad Hoc Communication 6, no. 1 (2023): 38–49. http://dx.doi.org/10.54216/ijwac.060104.
Повний текст джерелаKarthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Повний текст джерелаHuda, Shamsul, John Yearwood, Mohammad Mehedi Hassan, and Ahmad Almogren. "Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks." Applied Soft Computing 71 (October 2018): 66–77. http://dx.doi.org/10.1016/j.asoc.2018.06.017.
Повний текст джерелаMuridzi, Gibson. "Implication of internet of things (IoT) on organisational performance for SMEs in emerging economies – a systematic review." Technology audit and production reserves 6, no. 4(74) (December 2, 2023): 27–35. http://dx.doi.org/10.15587/2706-5448.2023.292183.
Повний текст джерелаPreuveneers, Davy, Wouter Joosen, and Elisabeth Ilie-Zudor. "Trustworthy data-driven networked production for customer-centric plants." Industrial Management & Data Systems 117, no. 10 (December 4, 2017): 2305–24. http://dx.doi.org/10.1108/imds-10-2016-0419.
Повний текст джерелаCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (December 17, 2023): 9886. http://dx.doi.org/10.3390/s23249886.
Повний текст джерелаCharmanas, Konstantinos, Konstantinos Georgiou, Nikolaos Mittas, and Lefteris Angelis. "Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications." Computers 12, no. 10 (October 20, 2023): 211. http://dx.doi.org/10.3390/computers12100211.
Повний текст джерелаKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Повний текст джерела.., Anil Audumbar, Saurabh .., Hemachandran .., Shraddhesh Gadilkar, Zakka Benisemeni Esther, Ganesh Shivaji Pise, and Jude Imuede. "Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage." Journal of Cybersecurity and Information Management 13, no. 1 (2024): 46–59. http://dx.doi.org/10.54216/jcim.130105.
Повний текст джерелаAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.
Повний текст джерелаTarrés-Puertas, Marta I., Lluís Brosa, Albert Comerma, Josep M. Rossell, and Antonio D. Dorado. "Architecting an Open-Source IIoT Framework for Real-Time Control and Monitoring in the Bioleaching Industry." Applied Sciences 14, no. 1 (December 29, 2023): 350. http://dx.doi.org/10.3390/app14010350.
Повний текст джерелаRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.
Повний текст джерелаShevtsov, Vadim, and Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts." NBI Technologies, no. 3 (March 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Повний текст джерелаAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (June 15, 2023): 2710. http://dx.doi.org/10.3390/math11122710.
Повний текст джерелаKant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Повний текст джерелаBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin, and Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (November 7, 2022): 14645. http://dx.doi.org/10.3390/su142114645.
Повний текст джерелаFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad, and Imran Ashraf. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry." Sensors 23, no. 21 (November 3, 2023): 8958. http://dx.doi.org/10.3390/s23218958.
Повний текст джерелаAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (August 28, 2023): 7470. http://dx.doi.org/10.3390/s23177470.
Повний текст джерелаVarga, Pal, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz, and Laszlo Toka. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps." Sensors 20, no. 3 (February 4, 2020): 828. http://dx.doi.org/10.3390/s20030828.
Повний текст джерелаAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman, and Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network." Sustainability 15, no. 11 (June 2, 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Повний текст джерелаVijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Повний текст джерелаUllah, Insaf, Ali Alkhalifah, Maha M. Althobaiti, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Muhammad Asghar Khan, and Jimmy Ming-Tai Wu. "Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–8. http://dx.doi.org/10.1155/2022/7336279.
Повний текст джерелаDwivedi, Sanjeev Kumar, Priyadarshini Roy, Chinky Karda, Shalini Agrawal, and Ruhul Amin. "Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey." Security and Communication Networks 2021 (August 23, 2021): 1–21. http://dx.doi.org/10.1155/2021/7142048.
Повний текст джерелаEssop, Ismael, José C. Ribeiro, Maria Papaioannou, Georgios Zachos, Georgios Mantas, and Jonathan Rodriguez. "Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks." Sensors 21, no. 4 (February 23, 2021): 1528. http://dx.doi.org/10.3390/s21041528.
Повний текст джерелаMa, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Повний текст джерела