Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Preface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation.

5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment.

2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based Authorization Algorithm; 3.2.2 Customized Geometric Transformation Algorithm; 4 Case Study for Approach Validation; 5 Conclusion and Future Works; Acknowledgements; References; 3 A New Approach to Cyberphysical Security in Industry 4.0.

Abstract1 Introduction; 2 Background; 3 Secure Manufacturing Information Architecture; 3.1 Pilot of Direct-to-Machine Security; 4 Manufacturing Security Enforcement Device; 5 Pilot of the Manufacturing Security Enforcement Device; 6 Conclusion; Acknowledgements; References; 4 SCADA System Forensic Analysis Within IIoT; 1 Introduction; 1.1 SCADA Progression and the Development of IIoT; 2 Conceptual Architecture of a SCADA System; 2.1 SCADA Hardware; 2.2 SCADA Software; 2.3 Networking; 3 Examples of SCADA System Incidents Prior to IIoT; 3.1 Trans-Siberian Pipeline Explosion.

3.2 Maroochy Shire Water System3.3 Stuxnet; 3.4 Duqu; 3.5 Flame; 4 SCADA Forensics Within IIoT; 4.1 Forensic Challenges; 4.2 Current Data Acquisition Methods for SCADA Systems; 5 Forensic Acquisition of SCADA Artefacts; 5.1 Network Data Acquisition; 5.2 Device Data Acquisition; 5.3 Half-Life of Data Within a SCADA System; 6 SCADA Forensic Process; 6.1 Existing Incident Response Models; 6.2 Forensic Methodology for SCADA Within IIoT; 6.3 SCADA Forensic Workstation; 7 Conclusion; 8 List of Abbreviations; References; 5 Big Data Security Intelligence for Healthcare Industry 4.0; Abstract.

Browse Subjects

Show more subjects...

Statistics

from
to
Export