|
|
|
Bilgin Metin, Sefa Duran, Eda Telli, Meltem Mutlutürk and Martin Wynn
In today?s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment?based on information relating to business requirements, human elements, and th...
ver más
|
|
|
|
|
|
|
Carlos Serôdio, Pedro Mestre, Jorge Cabral, Monica Gomes and Frederico Branco
In the context of Industry 4.0, this paper explores the vital role of advanced technologies, including Cyber?Physical Systems (CPS), Big Data, Internet of Things (IoT), digital twins, and Artificial Intelligence (AI), in enhancing data valorization and m...
ver más
|
|
|
|
|
|
|
Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely m...
ver más
|
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Edi Surya Negara, Achmad Nizar Hidayanto, Ria Andryani and Rezki Syaputra
This article is a literature review on smart contract applications in various domains. The aim is to investigate technological developments and implementation of smart contracts in various domains. For this purpose, the theoretical basis of various paper...
ver más
|
|
|
|
|
|
|
Fareed Ud Din, David Paul, Joe Ryan, Frans Henskens and Mark Wallis
The Fourth Industrial Revolution (Industry 4.0), with the help of cyber-physical systems (CPS), the Internet of Things (IoT), and Artificial Intelligence (AI), is transforming the way industrial setups are designed. Recent literature has provided insight...
ver más
|
|
|
|
|
|
|
Abel Yeboah-Ofori and Shareeful Islam
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution co...
ver más
|
|
|
|
|
|
|
Olusola Akinrolabu, Steve New and Andrew Martin
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ...
ver más
|
|
|
|
|
|
|
Oleg Pokusaev,Vasily Kupriyanovsky,Dmitry Katzin,Dmitry Namiot
Pág. 81 - 93
The article discusses issues related to the architecture of autonomous (unmanned) car software. The work uses the English abbreviation CAV (Connected Autonomous Vehicle). Automobile vehicles today have much more complex computer systems than airplanes, d...
ver más
|
|
|
|
|
|
|
M.Yu. Vasenev
Pág. 50 - 58
This article considers an actual question about which technological changes affect the modern logging machines and all forestry within the frameworks of «Industry 4.0» conception. There is disclosed the concept as «Forestry 4.0», is given the characteris...
ver más
|
|
|
|