Zeitschriftenartikel zum Thema „SECURING INDUSTRIAL IOT“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "SECURING INDUSTRIAL IOT" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Chen, Chien-Ying, Monowar Hasan und Sibin Mohan. „Securing Real-Time Internet-of-Things“. Sensors 18, Nr. 12 (10.12.2018): 4356. http://dx.doi.org/10.3390/s18124356.
Der volle Inhalt der QuelleDhirani, Lubna Luxmi, Eddie Armstrong und Thomas Newe. „Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap“. Sensors 21, Nr. 11 (05.06.2021): 3901. http://dx.doi.org/10.3390/s21113901.
Der volle Inhalt der QuelleMahmood, Mohammed, und Jassim Abdul-Jabbar. „Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions“. Al-Rafidain Engineering Journal (AREJ) 28, Nr. 1 (01.03.2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.
Der volle Inhalt der QuelleGeorge, Gemini, und Sabu M. Thampi. „A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations“. IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.
Der volle Inhalt der QuelleDakhnovich, A. D., D. A. Moskvin und D. P. Zegzhda. „Approach for Securing Network Communications Modelling Based on Smart Multipath Routing“. Nonlinear Phenomena in Complex Systems 23, Nr. 4 (04.12.2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.
Der volle Inhalt der QuelleYas, Harith, und Manal M. Nasir. „Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network“. Journal of Cybersecurity and Information Management 1, Nr. 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.
Der volle Inhalt der QuelleKurdi, Hassan, und Vijey Thayananthan. „A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT“. Applied Sciences 12, Nr. 14 (16.07.2022): 7173. http://dx.doi.org/10.3390/app12147173.
Der volle Inhalt der QuelleElkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera und Ahameed A. Badawy. „Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage“. ACM Journal on Emerging Technologies in Computing Systems 18, Nr. 1 (31.01.2022): 1–28. http://dx.doi.org/10.1145/3468064.
Der volle Inhalt der QuelleKristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz und Pedro Castillejo. „Security Assessment of Agriculture IoT (AIoT) Applications“. Applied Sciences 11, Nr. 13 (23.06.2021): 5841. http://dx.doi.org/10.3390/app11135841.
Der volle Inhalt der QuelleJuma, Mazen, Fuad AlAttar und Basim Touqan. „Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)“. IoT 4, Nr. 1 (06.02.2023): 27–55. http://dx.doi.org/10.3390/iot4010002.
Der volle Inhalt der QuelleHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia und Eftim Zdravevski. „A Framework for Malicious Traffic Detection in IoT Healthcare Environment“. Sensors 21, Nr. 9 (26.04.2021): 3025. http://dx.doi.org/10.3390/s21093025.
Der volle Inhalt der QuellePlaga, Sven, Norbert Wiedermann, Simon Duque Anton, Stefan Tatschner, Hans Schotten und Thomas Newe. „Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions“. Future Generation Computer Systems 93 (April 2019): 596–608. http://dx.doi.org/10.1016/j.future.2018.11.008.
Der volle Inhalt der QuelleZahid, Huma, Sadaf Hina, Muhammad Faisal Hayat und Ghalib A. Shah. „Agentless Approach for Security Information and Event Management in Industrial IoT“. Electronics 12, Nr. 8 (12.04.2023): 1831. http://dx.doi.org/10.3390/electronics12081831.
Der volle Inhalt der QuelleYankson, Benjamin, Tyler Loucks, Andrea Sampson und Chelsea Lojano. „Robots Security Assessment and Analysis Using Open-Source Tools“. International Conference on Cyber Warfare and Security 18, Nr. 1 (28.02.2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Der volle Inhalt der QuelleKolhar, Manjur, und Sultan Mesfer Aldossary. „A Deep Learning Approach for Securing IoT Infrastructure with Emphasis on Smart Vertical Networks“. Designs 7, Nr. 6 (01.12.2023): 139. http://dx.doi.org/10.3390/designs7060139.
Der volle Inhalt der QuelleHasan, Ahmad, Muazzam A. Khan, Balawal Shabir, Arslan Munir, Asad Waqar Malik, Zahid Anwar und Jawad Ahmad. „Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things“. Applied Sciences 12, Nr. 22 (11.11.2022): 11442. http://dx.doi.org/10.3390/app122211442.
Der volle Inhalt der QuelleKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou und Panagiotis Sarigiannidis. „IDS for Industrial Applications: A Federated Learning Approach with Active Personalization“. Sensors 21, Nr. 20 (11.10.2021): 6743. http://dx.doi.org/10.3390/s21206743.
Der volle Inhalt der QuellePal, Shantanu, und Zahra Jadidi. „Analysis of Security Issues and Countermeasures for the Industrial Internet of Things“. Applied Sciences 11, Nr. 20 (10.10.2021): 9393. http://dx.doi.org/10.3390/app11209393.
Der volle Inhalt der QuelleBurange, Anup W., und Vaishali M. Deshmukh. „Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 7 (01.09.2023): 14–22. http://dx.doi.org/10.17762/ijritcc.v11i7.7788.
Der volle Inhalt der QuelleSharma, Parjanay, Siddhant Jain, Shashank Gupta und Vinay Chamola. „Role of machine learning and deep learning in securing 5G-driven industrial IoT applications“. Ad Hoc Networks 123 (Dezember 2021): 102685. http://dx.doi.org/10.1016/j.adhoc.2021.102685.
Der volle Inhalt der QuelleElsisi, Mahmoud, Karar Mahmoud, Matti Lehtonen und Mohamed M. F. Darwish. „Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters“. Sensors 21, Nr. 2 (12.01.2021): 487. http://dx.doi.org/10.3390/s21020487.
Der volle Inhalt der QuelleMudassir, Mohammed, Devrim Unal, Mohammad Hammoudeh und Farag Azzedin. „Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches“. Wireless Communications and Mobile Computing 2022 (17.05.2022): 1–12. http://dx.doi.org/10.1155/2022/2845446.
Der volle Inhalt der QuelleAlharbi, Muhammad H., und Omar H. Alhazmi. „User Authentication Scheme for Internet of Things Using Near-Field Communication“. International Journal of Reliability, Quality and Safety Engineering 27, Nr. 05 (23.03.2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Der volle Inhalt der QuelleIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel und Ashish Kumar Mourya. „Security Aspects of Blockchain Technology Intended for Industrial Applications“. Electronics 10, Nr. 8 (16.04.2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Der volle Inhalt der QuelleChaudhary, Gopal, Smriti Srivastava und Manju Khari. „Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats“. International Journal of Wireless and Ad Hoc Communication 5, Nr. 2 (2022): 19–34. http://dx.doi.org/10.54216/ijwac.050202.
Der volle Inhalt der QuelleChaudhary, Gopal, Smriti Srivastava und Manju Khari. „Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats“. International Journal of Wireless and Ad Hoc Communication 6, Nr. 1 (2023): 38–49. http://dx.doi.org/10.54216/ijwac.060104.
Der volle Inhalt der QuelleKarthik, M., und M. Krishnan. „Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism“. International Journal of Intelligent Engineering and Systems 14, Nr. 1 (28.02.2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Der volle Inhalt der QuelleHuda, Shamsul, John Yearwood, Mohammad Mehedi Hassan und Ahmad Almogren. „Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks“. Applied Soft Computing 71 (Oktober 2018): 66–77. http://dx.doi.org/10.1016/j.asoc.2018.06.017.
Der volle Inhalt der QuelleMuridzi, Gibson. „Implication of internet of things (IoT) on organisational performance for SMEs in emerging economies – a systematic review“. Technology audit and production reserves 6, Nr. 4(74) (02.12.2023): 27–35. http://dx.doi.org/10.15587/2706-5448.2023.292183.
Der volle Inhalt der QuellePreuveneers, Davy, Wouter Joosen und Elisabeth Ilie-Zudor. „Trustworthy data-driven networked production for customer-centric plants“. Industrial Management & Data Systems 117, Nr. 10 (04.12.2017): 2305–24. http://dx.doi.org/10.1108/imds-10-2016-0419.
Der volle Inhalt der QuelleCultice, Tyler, Joseph Clark, Wu Yang und Himanshu Thapliyal. „A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World“. Sensors 23, Nr. 24 (17.12.2023): 9886. http://dx.doi.org/10.3390/s23249886.
Der volle Inhalt der QuelleCharmanas, Konstantinos, Konstantinos Georgiou, Nikolaos Mittas und Lefteris Angelis. „Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications“. Computers 12, Nr. 10 (20.10.2023): 211. http://dx.doi.org/10.3390/computers12100211.
Der volle Inhalt der QuelleKhurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam und Shahid Raza. „TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices“. Security and Communication Networks 2022 (25.05.2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.
Der volle Inhalt der Quelle.., Anil Audumbar, Saurabh .., Hemachandran .., Shraddhesh Gadilkar, Zakka Benisemeni Esther, Ganesh Shivaji Pise und Jude Imuede. „Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage“. Journal of Cybersecurity and Information Management 13, Nr. 1 (2024): 46–59. http://dx.doi.org/10.54216/jcim.130105.
Der volle Inhalt der QuelleAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan und Christos Emmanouilidis. „Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications“. Sensors 21, Nr. 11 (24.05.2021): 3654. http://dx.doi.org/10.3390/s21113654.
Der volle Inhalt der QuelleTarrés-Puertas, Marta I., Lluís Brosa, Albert Comerma, Josep M. Rossell und Antonio D. Dorado. „Architecting an Open-Source IIoT Framework for Real-Time Control and Monitoring in the Bioleaching Industry“. Applied Sciences 14, Nr. 1 (29.12.2023): 350. http://dx.doi.org/10.3390/app14010350.
Der volle Inhalt der QuelleRaimundo, Ricardo Jorge, und Albérico Travassos Rosário. „Cybersecurity in the Internet of Things in Industrial Management“. Applied Sciences 12, Nr. 3 (02.02.2022): 1598. http://dx.doi.org/10.3390/app12031598.
Der volle Inhalt der QuelleShevtsov, Vadim, und Nikita Kasimovsky. „Threat and Vulnerability Analysis of IoT and IIoT Concepts“. NBI Technologies, Nr. 3 (März 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.
Der volle Inhalt der QuelleAlasmary, Hisham. „RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things“. Mathematics 11, Nr. 12 (15.06.2023): 2710. http://dx.doi.org/10.3390/math11122710.
Der volle Inhalt der QuelleKant, Daniel, Andreas Johannsen und Reiner Creutzburg. „Analysis of IoT Security Risks based on the exposure of the MQTT Protocol“. Electronic Imaging 2021, Nr. 3 (18.06.2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Der volle Inhalt der QuelleBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin und Nivin A. Ghamry. „IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices“. Sustainability 14, Nr. 21 (07.11.2022): 14645. http://dx.doi.org/10.3390/su142114645.
Der volle Inhalt der QuelleFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, Atif Alvi, Furqan Rustam, Miguel Angel López Flores, Juan Castanedo Galán, Md Abdus Samad und Imran Ashraf. „A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry“. Sensors 23, Nr. 21 (03.11.2023): 8958. http://dx.doi.org/10.3390/s23218958.
Der volle Inhalt der QuelleAlotaibi, Bandar. „A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities“. Sensors 23, Nr. 17 (28.08.2023): 7470. http://dx.doi.org/10.3390/s23177470.
Der volle Inhalt der QuelleVarga, Pal, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz und Laszlo Toka. „5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps“. Sensors 20, Nr. 3 (04.02.2020): 828. http://dx.doi.org/10.3390/s20030828.
Der volle Inhalt der QuelleAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman und Asadullah Shaikh. „Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network“. Sustainability 15, Nr. 11 (02.06.2023): 9001. http://dx.doi.org/10.3390/su15119001.
Der volle Inhalt der QuelleVijayakumaran, C., B. Muthusenthil und B. Manickavasagam. „A reliable next generation cyber security architecture for industrial internet of things environment“. International Journal of Electrical and Computer Engineering (IJECE) 10, Nr. 1 (01.02.2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Der volle Inhalt der QuelleUllah, Insaf, Ali Alkhalifah, Maha M. Althobaiti, Fahd N. Al-Wesabi, Anwer Mustafa Hilal, Muhammad Asghar Khan und Jimmy Ming-Tai Wu. „Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography“. Wireless Communications and Mobile Computing 2022 (08.02.2022): 1–8. http://dx.doi.org/10.1155/2022/7336279.
Der volle Inhalt der QuelleDwivedi, Sanjeev Kumar, Priyadarshini Roy, Chinky Karda, Shalini Agrawal und Ruhul Amin. „Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey“. Security and Communication Networks 2021 (23.08.2021): 1–21. http://dx.doi.org/10.1155/2021/7142048.
Der volle Inhalt der QuelleEssop, Ismael, José C. Ribeiro, Maria Papaioannou, Georgios Zachos, Georgios Mantas und Jonathan Rodriguez. „Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks“. Sensors 21, Nr. 4 (23.02.2021): 1528. http://dx.doi.org/10.3390/s21041528.
Der volle Inhalt der QuelleMa, Jinnan, Xuekui Shangguan und Ying Zhang. „IoT Security Review: A Case Study of IIoT, IoV, and Smart Home“. Wireless Communications and Mobile Computing 2022 (21.08.2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Der volle Inhalt der Quelle