Maintenance performance in the age of Industry 4.0: A bibliometric performance analysis and a systematic literature review

S Werbińska-Wojciechowska, K Winiarska - Sensors, 2023 - mdpi.com
Featured Application This article is focused on a literature review to provide a valuable
resource for understanding the latest developments in the Maintenance 4.0 approach. The …

Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework

A Haleem, M Javaid, RP Singh, S Rab… - Industrial Robot: the …, 2022 - emerald.com
Purpose Industry 4.0 refers to the interconnection of cyber-physical systems, which connects
the physical and digital worlds by collecting digital data from physical objects/processes …

Using knowledge units of programming languages to recommend reviewers for pull requests: an empirical study

M Ahasanuzzaman, GA Oliva, AE Hassan - Empirical Software …, 2024 - Springer
Determining the right code reviewer for a given code change requires understanding the
characteristics of the changed code, identifying the skills of each potential reviewer …

Cybersecurity curricular guidelines

M Bishop, D Burley, S Buck, JJ Ekstrom… - … Security Education for a …, 2017 - Springer
The goal of the Joint Task Force on Cybersecurity Education is to develop comprehensive
undergraduate curricular guidance in cybersecurity that will support future program …

Cyber Security Education

G Austin - Principles and Policies. New York, NY, UK and New …, 2020 - api.taylorfrancis.com
Names: Austin, Greg, 1951-editor. Title: Cyber-security education: principles and
policies/edited by Greg Austin. Description: London; New York: Routledge/Taylor & Francis …

Methods of Current Knowledge Teaching on the Cybersecurity Example

E Nyemkova, C Justice, S Liaskovska, Y Lakh - Education Sciences, 2022 - mdpi.com
Teaching of modern cybersecurity specialists should be up to date and use the newest
methods and methodologies in universities as the IT industry is rapidly growing and …

Enhancing the cybersecurity education curricula through quantum computation

H Albataineh, M Nijim - Advances in Security, Networks, and Internet of …, 2021 - Springer
Governmental and corporate networks are increasingly at risk, malicious acts are escalating
abruptly, and organized crime and terrorist groups are expanding and improving their cyber …

An example of a cybersecurity education model

M Turkanović, T Welzer, M Hölbl - 2019 29th Annual …, 2019 - ieeexplore.ieee.org
IT technology is a vital part of our everyday life and society. Additionally, as it is present in
strategic domains like the military, healthcare or critical infrastructure, the aspect of …

Twelve dilemmas of reform in cyber security education

G Austin - Cyber Security Education, 2020 - taylorfrancis.com
This final chapter contrasts two broad approaches to the challenges of education policy for
cyber security: human capital and workforce development. The former is seated in a …

Identifying security requirements body of knowledge for the security systems engineer

S von Solms, A Marnewick - … in Proactive Information Security: 12th IFIP …, 2019 - Springer
The interconnected nature of Industry 4.0–driven operations and systems is introducing the
use of new digitized and connected industrial systems. These new connected environments …