A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… systematic survey on the security requirements of the IIoT. As we quantitatively demonstrate
in Section VI, the field of IIoT security … for an up-to-date systematic survey. In particular, as our …
in Section VI, the field of IIoT security … for an up-to-date systematic survey. In particular, as our …
Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review
… The security requirement is essential in the case of IoT to maintain trust among consumers.
Security management takes a back seat in IoT because of cost, size, and power. This …
Security management takes a back seat in IoT because of cost, size, and power. This …
A survey on internet of things security: Requirements, challenges, and solutions
… security problems. In addition, we propose a three layer-based taxonomy for mapping security
requirements … identified security requirements, challenges, and solutions from a top-down …
requirements … identified security requirements, challenges, and solutions from a top-down …
The internet of things security: A survey encompassing unexplored areas and new insights
… heterogeneous systems. The heterogeneity of systems can lead to some critical security …
For instance, using some software with poorly designed security features for different data. …
For instance, using some software with poorly designed security features for different data. …
A survey on privacy and security of Internet of Things
… We note that human user security requirements have not been addressed in IoT security …
To provide a complete overview, we consolidate these IoT security requirements and divide …
To provide a complete overview, we consolidate these IoT security requirements and divide …
Machine learning approaches to IoT security: A systematic literature review
… the applications of machine learning in IoT security. We adopted a systematic approach to
evaluating recent studies and future trends in IoT security by extracting the most relevant and …
evaluating recent studies and future trends in IoT security by extracting the most relevant and …
Internet of things as system of systems: A review of methodologies, frameworks, platforms, and tools
… Given the cyber–physical nature of IoT as well as the multidisciplinary approach required for
… : A survey on issues and enabling technologies,” IEEE Internet Things J., vol. 4, no. 1, pp. …
… : A survey on issues and enabling technologies,” IEEE Internet Things J., vol. 4, no. 1, pp. …
Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review
… Cybersecurity awareness and training programmes inform employees about the security
requirements that need to be in place to preserve critical data, and about company guidelines, …
requirements that need to be in place to preserve critical data, and about company guidelines, …
[HTML][HTML] Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
… significant results because of the distinct requirements of devices, such as scalability and …
for IoT security guidelines to evaluate the existing methods [27]. Previous systematic reviews …
for IoT security guidelines to evaluate the existing methods [27]. Previous systematic reviews …
Challenges and opportunities in securing the industrial internet of things
… As a preliminary step toward securing the IIoT, we first need to outline the specific security
goals for IIoT deployments. Therefore, we begin with a description of the security requirements …
goals for IIoT deployments. Therefore, we begin with a description of the security requirements …