[PDF][PDF] Intelligent Malware Detection for Industrial IoT Systems: A Proactive Approach using Deep Nueral Networks

P Swapna, V Gopi, VV Kumar, MP Kumar… - RES …, 2024 - resmilitaris.net
Abstract Industrial IoT (IIoT) system security becomes crucial as enterprises use IoT
technologies to improve efficiency, productivity, and automation. IoT devices in industrial …

Analysis of Various Security Schemes of Internet of Things

M Kapoor, PJ Kaur - … Technology for Competitive Strategies (ICTCS 2021) …, 2022 - Springer
Abstract The Internet of Things (IoT) is a decentralized network in which sensor nodes can
join and depart at any time. As a result of the network's design, hostile nodes infiltrate the …

Performant, Secure and Optimized Microservice-based Distributed Systems

C Lin - 2021 - era.library.ualberta.ca
Microservices have gained substantial importance over the past decades and matured into
one of the fundamental techniques to build performant, cloud-native, and costefficient …

ENVISIONING ORGANIZATIONAL IOT: EMBRACING DESIGN SCIENCE TO ADDRESS THE IOT VULNERABILITIES.

M Lapke, J Walker, M Mage - Journal of Information Systems …, 2023 - search.ebscohost.com
Understanding the security risks associated with the expanding use of Internet of Things
(IoT) devices is crucial for organizations. This paper utilizes the design-science methods …

The Automated Security Evaluation of Threat Paths Based on Petri Nets

MA Ramazanzadeh, B Barzegar… - Electronic and Cyber …, 2022 - ecdj.ihu.ac.ir
The key challenge to be well addressed in case of emerging technologies such as the
Internet of Things, Internet of Transportation, e-Health, etc. is the security. Ignoring this …

Design and Implementation of Secure Location Service Using Software Engineering Approach in the Age of Industry 4.0

S Tabassum, A Kumar, K Kaur, P Arora… - … on Information Systems …, 2021 - Springer
Data privacy and security are major concerns in any location-based system. In majority of
location-based systems, data security is ensured via data replacement policies. Data …

Evaluating Iot Device Security: Penetration Testing and Vulnerability Assessment with Flipper Zero

J Winston - Available at SSRN 4658141 - papers.ssrn.com
The proliferation of Internet of Things (IoT) devices in our interconnected world has brought
unprecedented convenience and efficiency. However, this rapid adoption has also given …

[引用][C] Gestaltungsmodell eines Informationssicherheits-managementsystems für produzierende Unternehmen in Industrie-4.0-Umgebungen

J Engländer - Dissertation, RWTH Aachen …

생산제품별특성분석을통한효율성및처리시간향상을위한IIoT 처리분석모델.

정윤수, 김용태 - Journal of Digital Convergence, 2022 - search.ebscohost.com
요 약 최근 산업 분야에서는 생산 효율성 향상 및 비용 절감을 위해서 저전력 프로세스와
네트워크 카드를 결합한 IIoT 장치를 산업 현장에 융합시킨 다양한 연구를 진행하고 있다. 본 …

[PDF][PDF] Discover Internet of Things

LD Van, LY Zhang, CH Chang, KL Tong, KR Wu… - 2021 - scholar.archive.org
We focus on the problem of predicting social media user's future behavior and consider it as
a graph node binary classification task. Existing works use graph representation learning …