Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Given the tremendous success of the Internet of Things in interconnecting consumer
devices, we observe a natural trend to likewise interconnect devices in industrial settings …

The role of internet-related technologies in shaping the work of accountants: New directions for accounting research

J Moll, O Yigitbasioglu - The British accounting review, 2019 - Elsevier
This paper reviews the accounting literature that focuses on four Internet-related
technologies that have the potential to dramatically change and disrupt the work of …

Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities

G Bathla, K Bhadane, RK Singh… - Mobile Information …, 2022 - Wiley Online Library
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …

The acceptance and usage of smart connected objects according to adoption stages: an enhanced technology acceptance model integrating the diffusion of …

E Attié, L Meyer-Waarden - Technological Forecasting and Social Change, 2022 - Elsevier
In today's digitalized world, technologies such as the Internet of Things (IoT) and smart
connected objects (SCOs) are moving to the forefront and have given rise to fundamental …

A DDoS attack detection and mitigation with software-defined Internet of Things framework

D Yin, L Zhang, K Yang - IEEE Access, 2018 - ieeexplore.ieee.org
With the spread of Internet of Things'(IoT) applications, security has become extremely
important. A recent distributed denial-of-service (DDoS) attack revealed the ubiquity of …

Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN

RMA Ujjan, Z Pervez, K Dahal, AK Bashir… - Future Generation …, 2020 - Elsevier
Abstract Distributed Denial of Service (DDoS) is one of the most rampant attacks in the
modern Internet of Things (IoT) network infrastructures. Security plays a very vital role for an …

[PDF][PDF] What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.

M Muench, J Stijohann, F Kargl, A Francillon… - NDSS, 2018 - wcventure.github.io
As networked embedded systems are becoming more ubiquitous, their security is becoming
critical to our daily life. While manual or automated large scale analysis of those systems …

Impact of IoT challenges and risks for SCM

HS Birkel, E Hartmann - Supply Chain Management: An International …, 2019 - emerald.com
Purpose The purpose of this paper is to offer a comprehensive overview of challenges and
risks of the Internet of Things (IoT) in supply chain management (SCM) and provide a …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Incomplete multiview clustering via semidiscrete optimal transport for multimedia data mining in IoT

J Gao, P Li, AA Laghari, G Srivastava… - ACM Transactions on …, 2024 - dl.acm.org
With the wide deployment of the Internet of Things (IoT), large volumes of incomplete
multiview data that violates data integrity is generated by various applications, which …