Open Access
Issue |
MATEC Web Conf.
Volume 298, 2019
International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2019)
|
|
---|---|---|
Article Number | 00071 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/matecconf/201929800071 | |
Published online | 18 November 2019 |
- C.C. Wang, C.H. Ko, J.S. Shiau, W. Long, Development of Monitoring and Diagnosis Technologies for Steel-Making Process in CSC, Optomechatronic Technologies (ISOT), International Symposium on 5-7 Nov. (2014). Seattle: WA, USA. Access mode: https://ieeexplore.ieee.org/document/7119397/ [Google Scholar]
- B.A. Weiss, M. Helu, G. Vogl, G. Qiao, Use Case Development to Advance Monitoring, Diagnostics, and Prognostics in Manufacturing Operations, IFAC-PapersOnLine 49-31, p. 13-18 (2016) [CrossRef] [Google Scholar]
- G. Qiao, B.A. Weiss, Weiss Advance Measurement Science to Assessments, Diagnostics, and Prognostics for Manufacturing Robotics Int J Progn Health Manag. 7 (2016); (Spec Iss on Smart Manufacturing PHM): 013 [Google Scholar]
- A.M. Pishchukhin, G.F. Akhmedyanova, Multidimensional analysis of monitoring and diagnostic information on the technological process. MATEC Web of Conferences 224, 01022 (2018) ICMTMTE 2018; https://doi.org/10.1051/matecconf/201822401022 [CrossRef] [EDP Sciences] [Google Scholar]
- Y. Zhang, Distributed intrusion detection system in a multi-layer network architecture of smart grids / Y. Zhang, L. Wang, W. Sun, R.C. Green, M. Alam // IEEE Transactions on Smart Grid, pp. 796-808 (2011) [CrossRef] [Google Scholar]
- Data Protection Policy / Daimler AG Mercedesstraße 137 70327 (2017). Stuttgart. Germany.18 p. Access mode: https://www.daimler.com. [Google Scholar]
- General Data Protection Regulation. (EU) 2016/679 // Official Journal of the European Union. No. 4, 5, pp. I.119/1 – I.119/88 (2016) [Google Scholar]
- I.V. Kotenko, A.A. Chechulin, D.A. Komashinsky, Categorisation of web pages for protection against inappropriate content in the Internet // International Journal of Internet Protocol Technology (IJIPT), 10 (1), pp. 61-71 (2017) [CrossRef] [Google Scholar]
- I.V. Kotenko, A.A. Chechulin, Common Framework for Attack Modeling and Security Evaluation in SIEM Systems // Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing (California: IEEE Computer Society), pp. 94-101 (2012) [Google Scholar]
- R. Dorf, R. Bishop, Modern Control Systems (10th Edition, Prentice Hall, 2014) [Google Scholar]
- A.I. Zecevic, D.D. Siljak, Control of Complex Systems (London, Springer Science Business Media, 2010) [CrossRef] [Google Scholar]
- K.S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications (Edition 2. John Wiley & Sons, Inc., Hoboken, New Jersey. USA. 2016) [CrossRef] [Google Scholar]
- S. Yuksel, Control of Stochastic Systems (Queen’s University Mathematics and Engineering and Mathematics and Statistics. 2017) [Google Scholar]
- R. Van Handel, Stochastic Calculus, Filtering and Stochastic Control (Springer, New York. 2007) [Google Scholar]
- C.P. Pfleeger, S.L. Pfleeger, Security in Computing (New Jersey, USA. Prentice Hall. 2015) [Google Scholar]
- L.A. Shuvalov, E.A. Semenchin, Mathematical model of impact of threats on information system of processing of personal information, Fundamental Research, 10, pp. 529-533 (2013) [Google Scholar]
- M. Stamp, Information Security Principles and Practice (San Jose State University. 2005) [CrossRef] [Google Scholar]
- A. Quarteroni, Mathematical Models in Science and Engineering, Notices of the AMS. Volume 56, Number 1. pp. 9-19 (2009) [Google Scholar]
- A. Myers, Complex System Reliability (Springer Science & Business Media. Luxembourg. 2010) [CrossRef] [Google Scholar]
- N. Walliman, Research methods: the basics (Taylor & Francis. London, UK. 2011) [Google Scholar]
- D.W. Oliver, T.P. Kelliher, J.G., Engineering Complex Systems With Models and Objects (McGraw-Hill Companies. New York, USA. 2007) [Google Scholar]
- I.B. Parashchuk, Parametrization principles of states space of Telecommunications network in the framework of formulation of problem of optimal adaptive networking monitoring, Modern Science: Development Tendencies. VII Extramunal International Science-Practical Conference. Part II. Krasnodar, pp. 142-144 (2014) [Google Scholar]
- I.B. Parashchuk, Decision Support at the Phase of Estimation of Telecommunication Network Functioning Efficiency, IEEE/ICC2001, St. Petersburg International Conference on Communications. SPb.: SPbGTU «LETI», pp. 2-6 (2001) [Google Scholar]
- I.V. Kotenko, I.B. Parashchuk, Synthesis of Controlled Parameters of Cyber-Physical-Social Systems for Monitoring of Security Incidents in Conditions of Uncertainty, 3rd Annual International Conference on Information System and Artificial Intelligence (ISAI2018) / IOP Conf. Series: Journal of Physics: Conference Series (JPCS) Vol.1069, pp 1-6 (2018) [Google Scholar]
- I.V. Kotenko, I.B. Parashchuk, T.K. Omar, Neuro-Fuzzy Models in Tasks of Intelligent Data Processing for Detection and Counteraction of Inappropriate, Dubious and Harmful Information, II International Scientific and Practical Conference «Fuzzy Technologies in the Industry» (FTI 2018), Ulyanovsk, Russia. / CEUR Workshop Proceedings (CEUR-WS). Vol.2258, pp. 116-125 (2018) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.