Journal articles on the topic 'Internet of Things (IoT) Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet of Things (IoT) Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Malge, Sunilkumar, and Pallavi Singh. "Internet of Things IoT: Security Perspective." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.
Full textShivani, Ramesh Sharma. "Internet of Things IoT IoT in Healthcare." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 980–82. https://doi.org/10.31142/ijtsrd23971.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textIORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.
Full textĐekić, Milica. "The Internet of Things security challenges." Tehnika 75, no. 6 (2020): 678–83. http://dx.doi.org/10.5937/tehnika2005678d.
Full textМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textMasyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.
Full textWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Full textSunilkumar, Malge, and Singh Pallavi. "Internet of Things IoT Security Perspective." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1041–43. https://doi.org/10.31142/ijtsrd24010.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textJadhav, Ajay, Sagar Khot, Sana Bagwan, and Vanmala Kadam. "Security Factors affecting Internet of Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 900–903. http://dx.doi.org/10.22214/ijraset.2022.48031.
Full textŞükür oğlu Əhmədov, İlham. "SMART HOMES BASED ON INTERNET OF THINGS TECHNOLOGY: CLASSIFICATION OF SECURITY RISKS." SCIENTIFIC RESEARCH 08, no. 4 (2022): 211–15. http://dx.doi.org/10.36719/2789-6919/08/211-215.
Full textJavida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.
Full textTiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Full textU. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Full textKovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.
Full textP, Vivekanand, and Kamal Kumar Srivastava Dr. "Cyber security in the age of internet of things." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 836–41. https://doi.org/10.5281/zenodo.14246392.
Full textChen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.
Full textSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Full textBurhade, Samruddhi S., and Sonal N. Deshmukh. "Security Privacy in Internet of Things(IOT)." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (2018): 57. http://dx.doi.org/10.23956/ijarcsse.v7i12.504.
Full textGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Full textHasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.
Full textMd., Aaqeel Hasan, Medida Jaypal, and Laxmi Prasanna. N. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. https://doi.org/10.35940/ijrte.C6417.0910321.
Full textMr., Kottureswara M. S. "Blockchain for the Internet of Things (IoT)." Journal of Scholastic Engineering Science and Management 1, no. 3 (2021): 34–40. https://doi.org/10.5281/zenodo.8312887.
Full textNavod, Neranjan Thilakarathne. "Security and Privacy Issues in IoT Environment." International Journal of Engineering and Management Research 10, no. 1 (2020): 26–29. https://doi.org/10.31033/ijemr.10.1.5.
Full textZhou, Juncheng. "Network Security Applications in the Internet of Things." Applied and Computational Engineering 109, no. 1 (2024): 139–44. http://dx.doi.org/10.54254/2755-2721/2024.17894.
Full textBiedermann, Christopher. "Cybersecurity and the Internet of Things." Zagadnienia Informacji Naukowej - Studia Informacyjne 54, no. 2(108) (2016): 22–36. http://dx.doi.org/10.36702/zin.301.
Full textEltayeb, Mohamed A. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 1 (2017): 1–18. http://dx.doi.org/10.4018/ijhiot.2017010101.
Full textRaghuvanshi, Abhishek, Umesh Kumar Singh, Thanwamas Kassanuk, and Khongdet Phasinam. "Internet of Things: Security Vulnerabilities and Countermeasures." ECS Transactions 107, no. 1 (2022): 15043–52. http://dx.doi.org/10.1149/10701.15043ecst.
Full textWu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.
Full textNurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era." Journal Informatic, Education and Management (JIEM) 5, no. 1 (2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.
Full textSonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Full textLi, Shancang, Theo Tryfonas, and Honglei Li. "The Internet of Things: a security point of view." Internet Research 26, no. 2 (2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.
Full textAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.
Full textAzrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Ambrina Kanwal. "Internet of Things Security: Challenges and Key Issues." Security and Communication Networks 2021 (September 14, 2021): 1–11. http://dx.doi.org/10.1155/2021/5533843.
Full textSurianarayanan, Chellammal, and Pethuru Raj Chelliah. "Integration of the Internet of Things and Cloud." International Journal of Cloud Applications and Computing 13, no. 1 (2023): 1–30. http://dx.doi.org/10.4018/ijcac.325624.
Full textYousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.
Full textOdame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.
Full textRajasekhar, J., T. Thanusha, G. Naga Jyothi, K. Tejaswi, and Laith Abualigah. "IoT based security and privacy implementation in smart home." Applied and Computational Engineering 44, no. 1 (2024): 202–7. http://dx.doi.org/10.54254/2755-2721/44/20230067.
Full textAdamova, A., T. Zhukabayeva, and Khu Ven-Tsen. "Internet of Things: Security and Privacy standards." Bulletin of L.N. Gumilyov Eurasian National University Technical Science and Technology Series 144, no. 3 (2023): 29–40. http://dx.doi.org/10.32523/2616-7263-2023-144-3-29-40.
Full textKaur, Rasmeet, B. L. Raina, and Avinash Sharma. "Internet of Things: Architecture, Applications, and Security Concerns." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2468–74. http://dx.doi.org/10.1166/jctn.2020.8917.
Full textZhang, Jiayi. "Design of Security Chips in the IoT Ecosystem." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 306–15. http://dx.doi.org/10.54097/hset.v70i.12478.
Full textToth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.
Full textChehal, Naman, and Karandeep Singh. "Security & Privacy Challenges in IOT Based Smart Homes." International Journal of Engineering Research in Computer Science and Engineering 9, no. 3 (2022): 13–18. http://dx.doi.org/10.36647/ijercse/09.03.art003.
Full textMaryJohn Rukmony, Sheeba, and Suganthi Gnanamony. "Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2233. http://dx.doi.org/10.11591/ijece.v13i2.pp2233-2239.
Full textSheeba, MaryJohn Rukmony, and Gnanamony Suganthi. "Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2233–39. https://doi.org/10.11591/ijece.v13i2.pp2233-2239.
Full textSachin, Upadhyay. "ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 216–22. https://doi.org/10.5281/zenodo.1202147.
Full text