A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Differential privacy for industrial internet of things: Opportunities, applications, and challenges
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Deep learning-powered vessel trajectory prediction for improving smart traffic services in maritime Internet of Things
The maritime Internet of Things (IoT) has recently emerged as a revolutionary
communication paradigm where a large number of moving vessels are closely …
communication paradigm where a large number of moving vessels are closely …
Exploiting flexible and secure cryptographic technique for multi-dimensional image based on graph data structure and three-input majority gate
Y Sha, J Mou, S Banerjee… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
The emergence of the Industrial Internet of Things (IIoT) has greatly improved the efficiency
of manufacturing, but it also faces significant security challenges during the operational …
of manufacturing, but it also faces significant security challenges during the operational …
[HTML][HTML] Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis
V Bolbot, K Kulkarni, P Brunou, OV Banda… - International Journal of …, 2022 - Elsevier
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
industry is undergoing the industry 4.0 revolution. This development is associated with novel …
A novel image steganography method for industrial internet of things security
The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI)
brings new security threats by exposing secret and private data. Thus, information security …
brings new security threats by exposing secret and private data. Thus, information security …
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey
S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …
[HTML][HTML] Accurate threat hunting in industrial internet of things edge devices
Abstract Industrial Internet of Things (IIoT) systems depend on a growing number of edge
devices such as sensors, controllers, and robots for data collection, transmission, storage …
devices such as sensors, controllers, and robots for data collection, transmission, storage …
Security and privacy in the industrial internet of things: Current standards and future challenges
The Internet of Things (IoT) is rapidly becoming an integral component of the industrial
market in areas such as automation and analytics, giving rise to what is termed as the …
market in areas such as automation and analytics, giving rise to what is termed as the …
Resilient consensus of discrete-time complex cyber-physical networks under deception attacks
This article considers the resilient consensus problems of discrete-time complex cyber-
physical networks under F-local deception attacks. A resilient consensus algorithm, where …
physical networks under F-local deception attacks. A resilient consensus algorithm, where …