[HTML][HTML] On predictive maintenance in industry 4.0: Overview, models, and challenges

M Achouch, M Dimitrova, K Ziane… - Applied Sciences, 2022 - mdpi.com
In the era of the fourth industrial revolution, several concepts have arisen in parallel with this
new revolution, such as predictive maintenance, which today plays a key role in sustainable …

[HTML][HTML] Systematic Analysis of Risks in Industry 5.0 Architecture

MA Hassan, S Zardari, MU Farooq, MM Alansari… - Applied Sciences, 2024 - mdpi.com
Industry 4.0, which was proposed ten years ago to address both the industry's strengths and
faults, has finally been replaced by Industry 5.0. It seeks to put human welfare at the core of …

[HTML][HTML] An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT)

SH Javed, MB Ahmad, M Asif, SH Almotiri, K Masood… - Electronics, 2022 - mdpi.com
The Industrial Internet of Things (I-IoT) is a manifestation of an extensive industrial network
that interconnects various sensors and wireless devices to integrate cyber and physical …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …

[HTML][HTML] IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories

H Kim, K Lee - Applied Sciences, 2022 - mdpi.com
The smart factory environment has been transformed into an Industrial Internet of Things
(IIoT) environment, which is an interconnected and open approach. This has made smart …

A secure network model against bot attacks in edge-enabled industrial Internet of Things

VA Memos, KE Psannis, Z Lv - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
The new Industry 4.0 standard has offered many advantages to the industries improving
their production rate since it evaluates novel cutting-edge technologies like artificial …

Web application firewall using machine learning and features engineering

A Shaheed, MHDB Kurdy - Security and Communication …, 2022 - Wiley Online Library
Web application security has become a major requirement for any business, especially with
the wide web attacks spreading despite the defensive measures and the continuous …

[PDF][PDF] A Delimitation of Data Sovereignty from Digital and Technological Sovereignty.

M Hellmeier, F von Scherenberg - ECIS, 2023 - researchgate.net
Digital technology significantly impacts our everyday social lives and how we conduct
business. This development results in abundant new data generated by people and …

Implementing data sovereignty: Requirements & challenges from practice

M Hellmeier, J Pampus, H Qarawlus… - Proceedings of the 18th …, 2023 - dl.acm.org
Data sovereignty, the possibility to keep control over data, is gaining increasing attention in
both research and industry. Due to complex supply chains and a strong trend toward …

[HTML][HTML] The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems

J Lohmöller, J Pennekamp, R Matzutt… - Data & Knowledge …, 2024 - Elsevier
Data ecosystems emerged as a new paradigm to facilitate the automated and massive
exchange of data from heterogeneous information sources between different stakeholders …