[1] | G. Kamieniecky and J. Bennet, “Emerging use of Industrial Internet of Things ( IIoT ),” 2019. |
[2] | L. Minh Dang, M. J. Piran, D. Han, K. Min, and H. Moon, “A survey on internet of things and cloud computing for healthcare,” Electron., vol. 8, no. 7, pp. 1–49, 2019. |
[3] | C. Qu, M. Tao, and R. Yuan, “A hypergraph-based blockchain model and application in internet of things-enabled smart homes,” Sensors (Switzerland), vol. 18, no. 9, 2018. |
[4] | E. MOHAMAD et al., “Review on Implementation of Industry 4.0 Globally and Preparing Malaysia for Fourth Industrial Revolution,” Proc. Des. Syst. Conf., vol. 2018.28, no. 0, p. 2203, 2018. |
[5] | W. Aulbur, A. CJ, and R. Bigghe, “Skill Development for Industry 4.0,” Rol. Berger. BRICS Ski. Dev. Work. Group, India Sect., pp. 1–50, 2016. |
[6] | J. Stephen Topper and N. C. Horner, “Model-based systems engineering in support of complex systems development,” Johns Hopkins APL Tech. Dig. (Applied Phys. Lab., vol. 32, no. 1, pp. 419–432, 2013. |
[7] | L. Atzori, A. Iera, and G. Morabito, “Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm,” no. December, 2016. |
[8] | A. Sens, “Blockchain Engineering,” ERCIM News, no. 110, 2017. |
[9] | P. Gokhale, O. Bhat, and S. Bhat, “(PDF) Introduction to IOT,” Int. Adv. Res. J. Sci. Eng. Technol., vol. 5, no. 1, pp. 41–44, 2018. |
[10] | R. Subha, “Biometrics in Internet of Things ( IoT ) Security,” vol. 5, no. 5, pp. 37–42, 2017. |
[11] | K. Rose, S. Eldridge, and L. Chapin, “The Internet of Things: An Overview,” Internet Soc., vol. 5, no. October 2015, pp. 1–50, 2015. |
[12] | G. Singh, “Cyber-physical systems and IoT,” 2016. |
[13] | S. M. P. P. S. A. P. Keyur K Patel, “Internet of Things-IOT Definition articl,” Ijesc, vol. 6, no. 5, p. 10, 2016. |
[14] | A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, Blockchain and iot integration: A systematic survey, vol. 18, no. 8. 2018. |
[15] | K. K. Patel, S. M. Patel, and P. G. Scholar, “Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges,” Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 1–10, 2016. |
[16] | R. Achary and J. Shaileshbhai, “Internet of Things: Essential Technology, Application Domain, Privacy and Security Challenges,” Int. J. Comput. Appl., vol. 157, no. 6, pp. 13–21, 2017. |
[17] | C. O. Turcu and C. E. Turcu, “Industrial internet of things as a challenge for higher education,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 55–60, 2018. |
[18] | E. Of et al., “An Overview of Industry 4. 0: Definition, Components, and Government Initiatives,” no. December, 2018. |
[19] | H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things ( IIoT ): An analysis framework,” vol. 101, no. April, pp. 1–12, 2018. |
[20] | D. Sontag, industry IoT vs industry 4.0 vs industry 5.0?, Making Sense of the Trend, Medium, May, 8, 2018. [online]. Accessed on: December 20, 2019. Available: https://medium.com/the-industry-4-0-blog/industril-iot-vs-industry-4-0-vs-industry-5-0-a5f9541da036. |
[21] | C. World, “The Internet of Things: An Overview,” no. October, 2015. |
[22] | C. Alcaraz, “Critical infrastructure protection: Requirements and challenges for the 21st Critical Infrastructure Protection: Requirements and Challenges for the 21st Century,” no. January 2015, 2017. |
[23] | M. E. Davey, “CRS Report for Congress Received through the CRS Web Resolution,” no. 391, pp. 1–6, 2009. |
[24] | T. Simon, “Critical Infrastructure and the Internet of Things,” no. 46, 2017. |
[25] | J. M. Rogerson, “Reconfiguring South Africa’s hotel industry 1990–2010: Structure, segmentation, and spatial transformation,” Appl. Geogr., vol. 36, pp. 59–68, Jan. 2013. |
[26] | J. Thangaraj and R. L. Narayanan, “Industry 1.0 to 4.0: the evolution of smart factories,” no. January, 2019. |
[27] | P. Sund, “Opportunities in Japan Opportunities & Barriers To Implementation of Opportunities in,” Bus. Sweden Tokyo, no. April, 2017. |
[28] | I. Ungurean, N. C. Gaitan, and V. G. Gaitan, “An IoT architecture for things from industrial environment,” IEEE Int. Conf. Commun., 2014. |
[29] | A. Alshehri and R. Sandhu, “Access control models for virtual object communication in cloud-enabled IoT,” Proc. - 2017 IEEE Int. Conf. Inf. Reuse Integr. IRI 2017, vol. 2017-Janua, pp. 16–25, 2017. |
[30] | M.. Paridah, A. Moradbak, A.. Mohamed, F. abdulwahab taiwo Owolabi, M. Asniza, and S. H.. Abdul Khalid, “We are IntechOpen, the world ’ s leading publisher of Open Access books Built by scientists, for scientists TOP 1 %,” Intech, vol. i, no. tourism, p. 13, 2016. |
[31] | M. Blowers, J. Iribarne, E. J. M. Colbert, and A. Kott, “In conclusion: The future internet of things and security of its control systems,” Adv. Inf. Secur., vol. 66, pp. 323–355, 2016. |
[32] | M. Kinoshita, “JAPAN ON THE NEW INDUSTRIAL REVOLUTION ( NIR ): Direction and its global implication for inclusive and sustainable industrial development,” no. March, 2019. |
[33] | K. D. Thoben, S. A. Wiesner, and T. Wuest, “‘Industrie 4.0’ and smart manufacturing-a review of research issues and application examples,” Int. J. Autom. Technol., vol. 11, no. 1, pp. 4–16, 2017. |
[34] | J. Nagy, J. Oláh, E. Erdei, D. Máté, and J. Popp, “The role and impact of industry 4.0 and the internet of things on the business strategy of the value chain-the case of hungary,” Sustain., vol. 10, no. 10, 2018. |
[35] | S. Vashi, J. Ram, J. Modi, S. Verma, and C. Prakash, “Internet of Things (IoT): A vision, architectural elements, and security issues,” Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, no. December, pp. 492–496, 2017. |
[36] | C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, “Fog computing for sustainable smart cities: A survey,” ACM Comput. Surv., vol. 50, no. 3, 2017. |
[37] | A. Ustundag and E. Cevikcan, “Industry 4.0: Managing The Digital Transformation,” Springer Ser. Adv. Manuf., no. January, pp. 1–283, 2018. |
[38] | Inayat Ali, Sonia Sabir, and Zahid Ullah, “Internet of Things Security, Device Authentication and Access Control: A Review,” Int. J. Comput. Sci. Inf. Secur. (IJCSIS),, vol. 14, no. 8, pp. 456–466, 2016. |
[39] | J. P. Meltzer and N. Shenai, “The US-China Economic Relationship: A Comprehensive Approach,” SSRN Electron. J., 2019. |
[40] | B. Tekinerdogan, “IoT System Development Methods,” pp. 137–155. |
[41] | P. Horan, “Using Rich Pictures in Information Systems Teaching,” 1st Int. Conf. Syst. Think. Mangement, 2000, vol. 1, pp. 257–262, 2000. |
[42] | S. Bell and S. Morse, “Rich pictures: A means to explore the ‘sustainable mind’?,” Sustain. Dev., vol. 21, no. 1, pp. 30–47, 2013. |
[43] | D. Zowghi and C. Coulin, “Requirements elicitation: A survey of techniques, approaches, and tools,” Eng. Manag. Softw. Requir., pp. 19–46, 2005. |
[44] | S. Roberts, S. Roberts, and G. H. Sanders, “R EQUIREMENTS D OCUMENT Digitally signed by,” pp. 1–55, 2015. |
[45] | L. Chung, “Non-Functional Requirements Non-Functional Requirements IEEE definition development and evaluate for the customer prior to NFRs: NFRs:,” pp. 1–26, 2011. |
[46] | P. Dike, “The impact of workplace diversity on organisations Title: The Impact of Workplace Diversity on Organisations Supervisor (Arcada): SVEINN ELDON,” pp. 1–59, 2013. |
[47] | J. Olsson and J. Liljegren, “Examining current academic and industry Enterprise Service Bus knowledge and what an up-to-date testing framework could look like,” no. june, 2012. |