Open Access
Issue |
MATEC Web Conf.
Volume 346, 2021
International Conference on Modern Trends in Manufacturing Technologies and Equipment (ICMTMTE 2021)
|
|
---|---|---|
Article Number | 01019 | |
Number of page(s) | 12 | |
Section | Materials Processing Technologies | |
DOI | https://doi.org/10.1051/matecconf/202134601019 | |
Published online | 26 October 2021 |
- J. Davis, T. Edgar, J. Porter, J. Bernaden, M. Sarli, Smart Manufacturing, manufacturing intelligence and demand-dynamics performance. Computers & Chemical Engineering, 47, pp. 145-156 (2012) [Google Scholar]
- I.V. Kotenko, D.S. Levshun, A.A. Chechulin, Event correlation in the integrated cyber-physical security system. Proceedings of the 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, pp. 484-486 (2016) [Google Scholar]
- I.B. Parashchuk, I.V. Kotenko, Target functions of the conceptual model for adaptive monitoring of integrated security in material processing systems. Materials Today: Proceedings. Elsevier. 38 (4), pp. 1454–1458 (2021) [Google Scholar]
- B.R. Mehta, Y.J. Reddy, Industrial Process Automation Systems: Design and Implementation. (Elsevier Science. Amsterdam, Holland, 2014) [Google Scholar]
- R.L. Krutz, Industrial Automation and Control System Security Principles. (International Society of Automation. Durham, US, 2016) [Google Scholar]
- M. Lehto, P. Neittaanmaki (ed.), Cyber Security: Analytics, Technology and Automation. (Springer International Publishing Switzerland. Cham, Switzerland, 2015) [CrossRef] [Google Scholar]
- L. Johnson, Security Controls Evaluation, Testing, and Assessment Handbook. (Academic Press. New York, 2019) [Google Scholar]
- R. Rogers, G. Miles, E. Fuller, T. Dykstra, Security Assessment. (Syngress Publishing. Amsterdam, Holland, 2004) [Google Scholar]
- C. McNab, Network Security Assessment. Second Edition. (O’Reilly Media Inc., Sebastopol, US, 2008) [Google Scholar]
- I.V. Kotenko, I.B. Parashchuk, Synthesis of Controlled Parameters of Cyber-Physical-Social Systems for Monitoring of Security Incidents in Conditions of Uncertainty. IOP Conf. Series: Journal of Physics: Conference Series (JPCS), 1069, pp. 1–6 (2018) [Google Scholar]
- I.B. Parashchuk, I.V. Kotenko, Formulation of a system of indicators of information protection quality in automatic systems of numerical control machines for advanced material processing. Materials Today: Proceedings. 19 (5), pp. 1835–1840 (2019) [Google Scholar]
- W. Whitt, Variability functions for Parametric Decomposition approximations of queueing networks. AT&T Bell Laboratories, 1994, (online), Available: http://www.columbia.edu/~ww2040/parametric.pdf, Accessed on February 2021. [Google Scholar]
- Y. Lu, R. Gadh, T. Tautges, Volume decomposition and feature recognition for hexahedral mesh generation. I-CARVE Lab, University of Wisconsin-Madison, 1998, (online), Available: https://www.osti.gov/biblio/14065, Accessed on February 2021. [Google Scholar]
- H. Sakurai, P. Dave, Volume Decomposition and Feature Recognition. Part II: Curved Objects Computer-Aided Design 28, 6/7, pp. 519–537 (1996) [Google Scholar]
- N. Sidiropoulos, L. Lathauwer, X. Fu, K. Huang, E. Papalexakis, C. Faloutsos, Tensor Decomposition for Signal Processing and Machine Learning (Fellow, IEEE), 2016, (online), Available: https://arxiv.org/pdf/1607.01668.pdf, Accessed on February 2021 [Google Scholar]
- E. Hubert, G. Labahn, Scaling Invariants and Symmetry Reduction of Dynamical Systems Cheriton School of Computer Science, 2010, (online), Available: https://cs.uwaterloo.ca/~glabahn/Papers/focm.pdf, Accessed on February 2021 [Google Scholar]
- S. AbdusSalam, C. Burgess, F. Quevedo, MFV reductions of MSSM parameter space. Journal of High Energy Physics. 2015, (online), Available: https://www.researchgate.net//publication/267983062, Accessed on March 2021 [Google Scholar]
- G. Ciuprina, J. Fernandez, Z. Ioan, S. Ilievski, Parameterized model order reduction. CASA-Report. Eindhoven University of Technology, 2015, (online), Available: http://www.win.tue.nl/analysis/reports/rana15-08.pdf, Accessed on March 2021 [Google Scholar]
- A. Zecevic, D. Siljak, Control of Complex Systems. (Springer Science and Business Media, London, UK, 2010) [CrossRef] [Google Scholar]
- F. Golnaraghi, B. Kuo, Automatic Control Systems. Tenth Edition. (McGraw-Hill, London, UK, 2017) [Google Scholar]
- I.V. Kotenko, I.B. Parashchuk, Assessment of components to ensure the security of control and diagnostic information about technological processes. MATEC Web of Conferences. 329 (03005), pp. 1–10 (2020) [Google Scholar]
- ISO/IEC 27002:2013/COR 2:2015. Information technology – Security techniques – Code of practice for information security controls – Technical Corrigendum 2, 2015, (online), Available: https://www.iso.org/standard/69379.html, Accessed on March 2021 [Google Scholar]
- ISO/IEC 27000:2018. Information technology – Security techniques – Information security management systems – Overview and vocabulary, 2018, (online), Available: https://www.iso.org/standard/73906.html, Accessed on March 2021 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.