Business analytics in Industry 4.0: A systematic review
Abstract Recently, the term “Industry 4.0” has emerged to characterize several Information
Technology and Communication (ICT) adoptions in production processes (eg, Internet‐of …
Technology and Communication (ICT) adoptions in production processes (eg, Internet‐of …
Metaheuristic techniques in attack and defense strategies for cybersecurity: a systematic review
A Salas-Fernández, B Crawford, R Soto… - Artificial Intelligence for …, 2021 - Springer
Motivated by the increasing interaction in cyberspace, researchers are developing
optimization in both attack and defense techniques. This optimization is performed using …
optimization in both attack and defense techniques. This optimization is performed using …
Data recovery via covert cognizance for unattended operational resilience
One of the important premises of unattended operation, a highly promoted characteristic of
fission batteries and advanced microreactors, is the ability to automate the analysis of …
fission batteries and advanced microreactors, is the ability to automate the analysis of …
Trust management and data protection for online social networks
S Thabit, Y LianShan, Y Tao… - IET Communications, 2022 - Wiley Online Library
Online social networks (OSNs) have been an integral aspect of daily life. Most people use
OSNs such as Facebook and Twitter to communicate and exchange information. Numerous …
OSNs such as Facebook and Twitter to communicate and exchange information. Numerous …
Validation of Covert Cognizance Active Defenses
A Sundaram, H Abdel-Khalik - Nuclear Science and Engineering, 2021 - Taylor & Francis
In the face of advanced persistent threat actors, existing information technology (IT)
defenses as well as some of the more recent operational technology (OT) defenses have …
defenses as well as some of the more recent operational technology (OT) defenses have …
The computer network security situation awareness based on decision tree algorithm
D Kong, L Lu, N Xiao - International Journal of Reasoning …, 2024 - inderscienceonline.com
Aiming at the problems of security awareness error and high channel collision rate in
computer network security awareness, a computer network security situation awareness …
computer network security awareness, a computer network security situation awareness …
Physical Benchmark for Evaluating Network Control Systems Under Cyber Attacks
C Parada-Garcia, C Restrepo-Morales… - Workshop on …, 2024 - Springer
This article describes the details of the configuration of a physical benchmark that is useful
for assessing performance degradation of networked control systems (NCS) when exposed …
for assessing performance degradation of networked control systems (NCS) when exposed …
Análise Bibliométrica Acerca da Segurança de Dados no Cenário da Indústria 4.0 entre 2017 e 2021
BX Rodrigues, TG de Lima, FPL Mendes… - Produto & …, 2023 - seer.ufrgs.br
O avanço da tecnológico da indústria 4.0 é cada vez mais acelerado. Enquanto a gestão
pode ser facilitada pelas inovações que diminuem variáveis e erros humanos e reduzem …
pode ser facilitada pelas inovações que diminuem variáveis e erros humanos e reduzem …
Covert Cognizance: Embedded Intelligence for Industrial Systems
A Sundaram - 2022 - hammer.purdue.edu
Can a critical industrial system, such as a nuclear reactor, be made self-aware and
cognizant of its operational history? Can it alert authorities covertly to malicious intrusion …
cognizant of its operational history? Can it alert authorities covertly to malicious intrusion …
Identification of Data Injection Attacks in Networked Control Systems with Varying Setpoint Condition
AO de Sá, RCS Machado - … on Metrology for Industry 4.0 & IoT, 2020 - ieeexplore.ieee.org
The Industry 4.0, which widely uses Networked Control Systems (NCS), plays a relevant role
in nowadays society and can be threatened by cyberattacks. In this context, recent literature …
in nowadays society and can be threatened by cyberattacks. In this context, recent literature …