Developing an AI-Enabled IIoT Platform - Lessons Learned from Early Use Case Validation
Abstract
References
Recommendations
Industrial Internet of Things enabled technologies, challenges, and future directions
Highlights- IIoT-enabled technologies, challenges, and future directions are explored.
- A blockchain-based cement industry security framework can overcome 51% of security issues.
- The performance of major companies depends on well-designed IIoT ...
AbstractThe Industrial Internet of Things (IIoT) is recognized as the fourth industrial revolution as it enhances productivity, dependability, and competitive performance by concentrating on profitability. IIoT-enabled technologies have been reviewed and ...
Graphical abstractDisplay Omitted
An IIoT-driven and AI-enabled framework for smart manufacturing system based on three-terminal collaborative platform
AbstractSmart manufacturing has great potential in the development of network collaboration, mass personalised customisation, sustainability and flexibility. Customised production can better meet the dynamic user needs, and network ...
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityThe factories of the future require efficient interconnection of their physical machines into the cyber space to cope with the emerging need of an increased uptime of machines, higher performance rates, an improved level of productivity and a collective ...
Comments
Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in