Open Access
Issue
MATEC Web Conf.
Volume 329, 2020
International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2020)
Article Number 03005
Number of page(s) 10
Section Mechanical Engineering
DOI https://doi.org/10.1051/matecconf/202032903005
Published online 26 November 2020
  1. General Data Protection Regulation. (EU) 2016/679 // Official Journal of the European Union. No. 4, 5, p. I.119/1–I.119/88 (2016) [Google Scholar]
  2. Data Protection Policy / Daimler AG Mercedesstraße 137 70327 (2017). Stuttgart. Germany. 18 p. Access mode: https://www.daimler.com. [Google Scholar]
  3. Y. Zhang, Distributed intrusion detection system in a multi-layer network architecture of smart grids / Y. Zhang, L. Wang, W. Sun, R.C. Green, M. Alam // IEEE Transactions on Smart Grid, pp. 796-808 (2011) [Google Scholar]
  4. B.A. Weiss, M. Helu, G. Vogl, G. Qiao, Use Case Development to Advance Monitoring, Diagnostics, and Prognostics in Manufacturing Operations, IFAC-PapersOnLine 49-31, p. 13-18 (2016) [Google Scholar]
  5. https://doi.org/10.1051/matecconf/201929800071 I.V. Kotenko, I.B. Parashchuk, Multi-criteria security assessment of control and diagnostic data on the technological processes. MATEC Web of Conferences 298, 00071 (2019) ICMTMTE 2019; [Google Scholar]
  6. C.C. Wang, C.H. Ko, J.S. Shiau, W. Long, Development of Monitoring and Diagnosis Technologies for Steel-Making Process in CSC, Optomechatronic Technologies (ISOT), International Symposium on 5-7 Nov. (2014). Seattle: WA, USA. Access mode: https://ieeexplore.ieee.org/document/7119397/ [Google Scholar]
  7. I.V. Kotenko, A.A. Chechulin, Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing (California: IEEE Computer Society), pp. 94-101 (2012) [Google Scholar]
  8. I. Kotenko, E. Doynikova, Security assessment of computer networks based on attack graphs and security events. Lecture Notes in Computer Science, 2014, 8407 LNCS, pp. 462-471. DOI: 10.1007/978-3-642-55032-4_47. [Google Scholar]
  9. I. Kotenko, Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security. 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS, 2007, pp. 614-619. DOI: 10.1109/IDAACS.2007.4488494. [Google Scholar]
  10. I.V. Kotenko, A.A. Chechulin, D.A. Komashinsky, Categorisation of web pages for protection against inappropriate content in the Internet // International Journal of Internet Protocol Technology (IJIPT), 10 (1), pp. 61-71 (2017) [Google Scholar]
  11. A.M. Pishchukhin, G.F. Akhmedyanova, Multidimensional analysis of monitoring and diagnostic information on the technological process. MATEC Web of Conferences 224, 01022 (2018) ICMTMTE 2018; https://doi.org/10.1051/matecconf/201822401022 [Google Scholar]
  12. G. Qiao, B.A. Weiss, Weiss Advance Measurement Science to Assessments, Diagnostics, and Prognostics for Manufacturing Robotics. Int J Progn Health Manag. 7 (2016); (Spec Iss on Smart Manufacturing PHM): 013 [Google Scholar]
  13. International Standard ISO/IEC TR 9126-4:2004, Software engineering. Product quality. Part 4: Quality in use metrics. JTC 1/SC 7. 66 p. (2004) [Google Scholar]
  14. International Standard ISO/IEC 25010:2011(E), Systems and software engineering–Systems and software Quality Requirements and Evaluation (SQuaRE). System and software quality models. JTC 1/SC 7. 44 p. (2011) [Google Scholar]
  15. K.S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications (Edition 2. John Wiley & Sons, Inc., Hoboken, New Jersey. USA. 2016) [CrossRef] [Google Scholar]
  16. R. Dorf, R. Bishop, Modern Control Systems (10th Edition, Prentice Hall, 2014) [Google Scholar]
  17. A.I. Zecevic, D.D. Siljak, Control of Complex Systems (London, Springer Science Business Media, 2010) [CrossRef] [Google Scholar]
  18. R. Van Handel, Stochastic Calculus, Filtering and Stochastic Control (Springer, New York. 2007) [Google Scholar]
  19. C.P. Pfleeger, S.L. Pfleeger, Security in Computing (New Jersey, USA. Prentice Hall. 2015) [Google Scholar]
  20. S. Yuksel, Control of Stochastic Systems (Queen’s University Mathematics and Engineering and Mathematics and Statistics. 2017) [Google Scholar]
  21. C.P. Pfleeger, S.L. Pfleeger, Security in Computing (New Jersey, USA. Prentice Hall. 2015) [Google Scholar]
  22. S. Yuksel, Control of Stochastic Systems (Queen’s University Mathematics and Engineering and Mathematics and Statistics. 2017) [Google Scholar]
  23. R. Van Handel, Stochastic Calculus, Filtering and Stochastic Control (Springer, New York. 2007) [Google Scholar]
  24. C. Kaner, W.P. Bond, Software Engineering Metrics: What Do They Measure and How Do We Know? 10th International Software Metrics Symposium (METRICS 2004). (2004). Access mode: https://kaner.com/pdfs/metrics2004.pdf [Google Scholar]
  25. P. Vizureanu, Expert Systems (Intech, Vukovar, Croatia. 2010) [CrossRef] [Google Scholar]
  26. J. Giarratano, G. Riley, Expert systems. Principles of development and programming. (4th edition, Williams. 2007) [Google Scholar]
  27. C. Marinescu, Quality Assessment of Enterprise Software Systems. Proceedings of the 2006 13th Working Conference on Reverse Engineering (IEEE Xplore), pp. 28-36 (2006) [Google Scholar]
  28. L.P. Volodko, Assessment of the Quality of Banking Information Technology and Services under Conditions of Uncertainty. Audit and Financial Analysis (AFA), 3, pp. 218-230 (2010) [Google Scholar]
  29. L.Yu. Kalinina, Software Product Quality Assessment. Quality. Innovations. Education (QIE), 4 (20), pp. 52-55 (2006) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.