From industry 4.0 to agriculture 4.0: Current status, enabling technologies, and research challenges
The three previous industrial revolutions profoundly transformed agriculture industry from
indigenous farming to mechanized farming and recent precision agriculture. Industrial …
indigenous farming to mechanized farming and recent precision agriculture. Industrial …
How machine learning changes the nature of cyberattacks on IoT networks: A survey
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …
life in recent years. However, this development does not only present advantages. Indeed …
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
A review of security and privacy concerns in the internet of things (IoT)
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …
applications. There are more than 50 billion devices connected globally. IoT applications' …
Svm-based cloning and jamming attack detection in iot sensor networks
Internet of things (IoT) devices are susceptible to numerous safety intimidations because of
their limited features and abilities. In IoT, the wireless communications are generally shown …
their limited features and abilities. In IoT, the wireless communications are generally shown …
Non-functional requirements elicitation for edge computing
S Gupta - Internet of Things, 2022 - Elsevier
The proliferation of the Internet of Things (IoT) devices and advances in their computing
capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate …
capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate …
Security audit of a blockchain-based industrial application platform
In recent years, both the Internet of Things (IoT) and blockchain technologies have been
highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the …
highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the …
Attack categorisation for IoT applications in critical infrastructures, a survey
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into …
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into …
Reliability of linear WSNs: A complementary overview and analysis of impact of cascaded failures on network lifetime
Abstract Linear Wireless Sensor Networks (LWSNs) are used in applications where
deployment scenarios necessitate sensor nodes to be placed over a line topology. However …
deployment scenarios necessitate sensor nodes to be placed over a line topology. However …
Security and privacy of smart waste management systems: a cyber-physical system perspective
Smart waste management systems (SWMSs) represent a fundamental technology to
efficiently manage the waste management and disposal process. Indeed, they provide …
efficiently manage the waste management and disposal process. Indeed, they provide …