Search

Your search keyword '"IIoT"' showing total 75 results

Search Constraints

Start Over You searched for: Descriptor "IIoT" Remove constraint Descriptor: "IIoT" Publisher springer nature Remove constraint Publisher: springer nature
75 results on '"IIoT"'

Search Results

1. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model.

2. Designing the future of coopetition: An IIoT approach for empowering SME networks.

3. An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM.

4. Enhancing intrusion detection in IIoT: optimized CNN model with multi-class SMOTE balancing.

5. Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks.

6. Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks.

7. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments.

8. A trusted routing mechanism for multi-attribute chain energy optimization for Industrial Internet of Things.

9. BSPC: blockchain-aided secure process control for improving the efficiency of industrial Internet of Things.

10. A blockchain-based cyber-security for connected networks.

11. A novel category detection of social media reviews in the restaurant industry.

12. Analysis of the development of sustainable entrepreneurship practices through knowledge and smart innovative based education system.

13. Process Modelling of an Analytic Control Machine in Virtual Reality Platform.

14. A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments.

15. A neutrosophic WPM-based machine learning model for device trust in industrial internet of things.

16. FSL: federated sequential learning-based cyberattack detection for Industrial Internet of Things.

17. Online prediction of automotive tempered glass quality using machine learning.

18. Davis Mayer Streebog Cryptographic Hash-Based Blockchain for Secure Transaction Management Using SDN in IIoT Applications.

19. An industrial IoT-enabled smart healthcare system using big data mining and machine learning.

20. A blockchain assisted multi-gateway authentication scheme for IIoT based on group.

21. Integrated Genetic Algorithm and Deep Learning Approach for Effective Cyber-Attack Detection and Classification in Industrial Internet of Things (IIoT) Environments.

22. An approach for designing smart manufacturing for the research and development of dye-sensitize solar cell.

23. An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks.

24. Futuristic CRISPR-based biosensing in the cloud and internet of things era: an overview.

25. Hierarchical framework for analysing the challenges of implementing industrial Internet of Things in manufacturing industries using ISM approach.

26. Industrial Internet of Things(IIoT)-Plattformtypen im Maschinen- und Anlagenbau.

27. A Fuzzy Logic Approach for Predicting Efficient LoRa Communication.

28. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT.

29. Spherical fuzzy decision making method based on combined compromise solution for IIoT industry evaluation.

30. Thorough Performance Evaluation & Analysis of the 6TiSCH Minimal Scheduling Function (MSF).

31. A control-driven autonomous authentication scheme for peer-to-peer control systems assisted industrial Internet of things.

32. Cyber-Physical Loops as Drivers of Value Creation in NDE 4.0.

33. The Core of the Fourth Revolutions: Industrial Internet of Things, Digital Twin, and Cyber-Physical Loops.

34. IoT Security Best Practices: Vorstellung eines Sicherheits- und Authentifizierungskonzepts bei der Realisierung von (Industrial) Internet of Things (IIoT)-Anwendungen – Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT.

35. Ambient self-powered cluster-based wireless sensor networks for industry 4.0 applications.

36. Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory.

37. A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things.

38. Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods.

39. Smart seed selection-based effective black box fuzzing for IIoT protocol.

40. Deep neural network-based clustering technique for secure IIoT.

41. Multiple regression analysis for the prediction of extraction efficiency in mining industry with industrial IoT.

42. Industrial Internet of Things in the production environment of a Shipyard 4.0.

43. 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications.

44. DVSMS: dynamic value stream mapping solution by applying IIoT.

45. Functional verification of distributed automation systems: Assisting production line operators by an automated model composition.

46. Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks.

47. IoT Best Practices: Fallstricke bei der Realisierung von (Industrial) Internet of Things (IIoT)-Projekten frühzeitig erkennen und adressieren.

48. IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT.

49. Carbon footprint assessment in manufacturing Industry 4.0 using machine learning with intelligent Internet of things.

50. Digital Twins : Basics and Applications

Catalog

Books, media, physical & digital resources