Security Issues and Privacy Concerns in Industry 4.0 Applications

Здесь есть возможность читать онлайн «Security Issues and Privacy Concerns in Industry 4.0 Applications» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Security Issues and Privacy Concerns in Industry 4.0 Applications: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Security Issues and Privacy Concerns in Industry 4.0 Applications»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The scope of
is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trend and the need for technological change in Industry 4.0.
Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT based health care management system, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of the dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.
Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Security Issues and Privacy Concerns in Industry 4.0 Applications — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Security Issues and Privacy Concerns in Industry 4.0 Applications», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

References

1. Sun, Panjun. “Research on cloud computing service based on trust access control.” International Journal of Engineering Business Management 12 (2020): 1847979019897444.

2. Siddiqui, Shadab, Manuj Darbari, and Diwakar Yagyasen. “A comprehensive study of challenges and issues in cloud computing.” In Soft Computing and Signal Processing , pp. 325-344. Springer, Singapore, 2019.

3. Chong, Ngo Yang. “Cloud Computing Challenges in a General Perspective.” Journal of Computing and Management Studies 3 (2019).

4. Meghanathan, Natarajan, Sumanth Reddy Allam, and Loretta A. Moore. “Tools and techniques for network forensics.” arXiv preprint arXiv:1004.0570 (2010).

5. Garfinkel, Simson. “Network forensics: Tapping the internet.” IEEE Internet Computing 6 (2002): 60-66.

6. Sikos, Leslie F. “Packet analysis for network forensics: a comprehensive survey.” Forensic Science International: Digital Investigation 32 (2020): 200892.

7. Frank, Alejandro Germán, Lucas Santos Dalenogare, and Néstor Fabián Ayala. “Industry 4.0 technologies: Implementation patterns in manufacturing companies.” International Journal of Production Economics 210 (2019): 15-26.

8. Bassi, Lorenzo. “Industry 4.0: Hope, hype or revolution?.” In 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI) , pp. 1-6. IEEE, 2017.

9. Lasi, Heiner, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. “Industry 4.0.” Business & Information Systems Engineering 6, no. 4 (2014): 239-242.

10. Vaidya, Saurabh, Prashant Ambad, and Santosh Bhosle. “Industry 4.0–a glimpse.” Procedia Manufacturing 20 (2018): 233-238.

11. Agolla, Joseph Evans. “Human capital in the smart manufacturing and industry 4.0 revolution.” Digital Transformation in Smart Manufacturing (2018): 41-58.

12. Bahrin, Mohd Aiman Kamarul, Mohd Fauzi Othman, Nor Hayati Nor Azli, and Muhamad Farihin Talib. “Industry 4.0: A review on industrial automation and robotic.” Jurnal Teknologi 78, no. 6-13 (2016).

13. Varghese, Anitha, and Deepaknath Tandur. “Wireless requirements and challenges in Industry 4.0.” In 2014 International Conference on Contemporary Computing and Informatics (IC3I) , pp. 634-638. IEEE, 2014.

14. Lee, Jay, Hossein Davari, Jaskaran Singh, and Vibhor Pandhare. “Industrial Artificial Intelligence for industry 4.0-based manufacturing systems.” Manufacturing Letters 18 (2018): 20-23.

15. Lo, Anthony, Yee Wei Law, and Martin Jacobsson. “A cellular-centric service architecture for machine-to-machine (M2M) communications.” IEEE wireless communications 20, no. 5 (2013): 143-151.

16. Wu, Geng, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson. “M2M: From mobile to embedded internet.” IEEE Communications Magazine 49, no. 4 (2011): 36-43.

17. Laghari, Asif Ali, Hui He, Asiya Khan, Neetesh Kumar, and RupakKharel. “Quality of experience framework for cloud computing (QoC).” IEEE Access 6 (2018): 64876-64890.

18. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. “A view of cloud computing.” Communications of the ACM 53, no. 4 (2010): 50-58.

19. Laghari, Asif Ali, Hui He, Muhammad Shafiq, and Asiya Khan. “Assessing effect of Cloud distance on end user’s Quality of Experience (QoE).” In 2016 2nd IEEE international conference on computer and communications (ICCC) , pp. 500-505.IEEE, 2016.

20. Laghari, Asif Ali, Hui He, Imtiaz A. Halepoto, M. SullemanMemon, and Sajida Parveen. “Analysis of quality of experience frameworks for cloud computing.” IJCSNS 17, no. 12 (2017): 228.

21. Kumar, Vishal, Asif Ali Laghari, ShahidKarim, Muhammad Shakir, and Ali Anwar Brohi. “Comparison of fog computing & cloud computing.” International Journal of Mathematical Sciences and Computing (IJMSC) 5, no. 1 (2019): 31-41.

22. Manvi, Sunilkumar S., and Gopal Krishna Shyam. “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.” Journal of Network and Computer Application s 41 (2014): 424-440.

23. Adhikari, Mainak, Sudarshan Nandy, and Tarachand Amgoth. “Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud.” Journal of Network and Computer Applications 128 (2019): 64-77.

24. Pereira, T., L. Barreto, and A. Amaral. “Network and information security challenges within Industry 4.0 paradigm.” Procedia manufacturing 13 (2017): 1253-1260.

25. Zhong, Ray Y., Xun Xu, Eberhard Klotz, and Stephen T. Newman. “Intelligent manufacturing in the context of industry 4.0: a review.” Engineering 3, no. 5 (2017): 616-630.

26. Preuveneers, Davy, and Elisabeth Ilie-Zudor. “The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.” Journal of Ambient Intelligence and Smart Environments 9, no. 3 (2017): 287-298.

27. Stock, Tim, and Günther Seliger. “Opportunities of sustainable manufacturing in industry 4.0.” Procedia Cirp 40 (2016): 536-541.

28. Gebhardt, Tobias, and Hans P. Reiser. “Network forensics for cloud computing.” In IFIP International Conference on Distributed Applications and Interoperable Systems , pp. 29-42. Springer, Berlin, Heidelberg, 2013.

29. Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. “Managing security of virtual machine images in a cloud environment.” In Proceedings of the 2009 ACM workshop on Cloud computing security , pp. 91-96. 2009.

30. Crowell, Susan F., Jason A. Nikolai, and Andrew T. Thorstensen. “Virtual machine trust isolation in a cloud environment.” U.S. Patent Application 13/969,705, filed February 19, 2015.

31. Scott-Nash, Mark E. “Roots-of-trust for measurement of virtual machines.” U.S. Patent 9,053,059, issued June 9, 2015.

32. Ramarathinam, Aravind, and Srivatsan Parthasarathy. “Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal.” U.S. Patent 9,342,326, issued May 17, 2016.

33. Kent, Karen, Suzanne Chevalier, Tim Grance, and Hung Dang. “Guide to integrating forensic techniques into incident response.” NIST Special Publication 10, no. 14 (2006): 800-86.

34. Milojičić, Dejan, Ignacio M. Llorente, and Ruben S. Montero. “Opennebula: A cloud management tool.” IEEE Internet Computing 15, no. 2 (2011): 11-14.

35. Ismaeel, Salam, Ali Miri, Dharmendra Chourishi, and SM Reza Dibaj. “Open source cloud management platforms: A review.” In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing , pp. 470-475. IEEE, 2015.

36. Dargahi, Tooska, Ali Dehghantanha, and Mauro Conti. “Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.” In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications , pp. 185-204. Syngress, 2017.

37. Barrowclough, John Patrick, and Rameez Asif. “Securing cloud hypervisors: A survey of the threats, vulnerabilities, and countermeasures.” Security and Communication Networks 2018 (2018).

38. Stergiou, Christos L., Andreas P. Plageras, Konstantinos E. Psannis, and Brij B. Gupta. “Secure machine learning scenario from big data in cloud computing via internet of things network.” In Handbook of Computer Networks and Cyber Security , pp. 525-554. Springer, Cham, 2020.

39. Chang, David Yu, Messaoud Benantar, John Yow-Chun Chang, and Vishwanath Venkataramappa. “Authentication and authorization methods for cloud computing security.” U.S. Patent 8,769,622 issued July 1, 2014.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Представляем Вашему вниманию похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Обсуждение, отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x