End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Internet of Things. This convergence has led to a drastic...
Saved in:
Main Authors: | Matthew Boeding, Michael Hempel, Hamid Sharif |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/17/1/34 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
by: Tamara Zhukabayeva, et al.
Published: (2025-01-01) -
Chip Design of PTP Time Synchronization for Industrial IoT
by: Yee-Shao Chen, et al.
Published: (2025-01-01) -
Task urgency-based resource allocation algorithm in industrial Internet of things
by: ZOU Hong, et al.
Published: (2024-03-01) -
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
by: Jakkarin Lapmoon, et al.
Published: (2025-01-01) -
Firmware vulnerability analysis based on formal verification of software and hardware
by: Peng-hui ZHANG, et al.
Published: (2016-07-01)