[PDF][PDF] A novel security architecture of internet of things

F Ali, H Yigang, R Yi - International Journal of Computer Theory and …, 2019 - academia.edu
In this era, the preeminent internet of things industry paradigms grasps the pledge to
transfigure the concept of communication with the connectivity of billions of devices and …

A comprehensive study of IoT security risks in building a secure smart city

A Bhargava, G Salunkhe, S Bhargava… - … Cities Roadmap: IoT …, 2021 - Wiley Online Library
Summary The Internet of Things (IoT) is capable of assimilating a variety of heterogeneous
systems, by facilitating seamless access and communication amongst an expansive range …

How the IoT (Internet of Things) Is Poised to Jump-Start the Next Revolution

A Behura - Internet of Things, 2023 - taylorfrancis.com
The industrial Internet of Things (IIoT) refers to interconnected sensors, instruments, and
other devices networked together with computers' industrial applications, including …

Software in the Manufacturing Industry: A Review of Security Challenges and Implications

Y Landeck - 2023 - aisel.aisnet.org
Software defines digital infrastructures in the manufacturing industry, connecting services
and computation resources to machines and devices. These infrastructures aim at increased …

Requirements and Design Architecture for Digital Twin End-to-End Trustworthiness

N Bicocchi, M Fogli, C Giannelli… - IEEE Internet …, 2024 - ieeexplore.ieee.org
The wide adoption of IoT involves a previously unseen level of complexity imposing to
multiple stakeholders to deal with and trust the complex integration of applications with a …

Identification of attack on data packets using rough set approach to secure end to end communication

B Wu, S Nazir, N Mukhtar - Complexity, 2020 - Wiley Online Library
Security has become one of the important factors for any network communication and
transmission of data packets. An organization with an optimal security system can lead to a …

IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey

M Atieh, O Mohammad, A Sabra, N Rmayti - 2022 - ieeexplore.ieee.org
Cybersecurity experts have noticed an increasing trend towards machine learning‐based
solutions and most of them revolve around machine learning and deep learning techniques …

Deep Learning Dan Teknologi Big Data Untuk Keamanan IOT

NI Putri - COMPUTING| Jurnal Informatika, 2020 - ejournal.unibba.ac.id
Di bidang artificial intelligence (AI), deep learning adalah metode yang termasuk dalam
keluarga yang lebih luas dari algoritma machine learning yang bekerja berdasarkan prinsip …

Process-of-Things: Weaving film industry's practices into the Internet-of-Things

Z Maamar, N Faci, E Kajan, S Purković, E Ugljanin - Internet of Things, 2020 - Elsevier
This paper presents a novel way to address the “silo” obstacle that is making things play a
limited role in the Internet-of-Things (IoT) arena since they mainly act as data suppliers. This …

Internet of things: basic concepts and decorum of smart services

A Behura, S Satpathy, SN Mohanty… - Internet of Things and Its …, 2022 - Springer
In the era of technology, everything is going to be digital. The devices that we are using
today are automatic, which means there is a minimal involvement of human beings as they …