Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
The AHP is used, in combination with the characteristics of the IIoT, to determine the influence weight coefficients of various attacks. The classification results of the detection model are combined in order to quantify the cybersecurity situation of the IIoT.
Abstract: An Industrial Internet-of-Things (IIoT) Cloud builds up a platform to accelerate the realization of factories running Industry 4.0 services.
Abstract—An Industrial Internet-of-Things (IIoT) Cloud builds up a platform to accelerate the realization of factories running Industry 4.0 services.
A novel AHP (Analytic Hierarchy Process) [2]-based risk assessment model is presented for an IIoT cloud to self-check its own health, especially for the ...
Huang and Sun (2018) propose an AHP-based risk assessment based on analyzing security risk function (confidentiality, integrity, availability) followed by the ...
People also ask
An Industrial Internet-of-Things (IIoT) Cloud builds up a platform to accelerate the realization of factories running Industry 4.0 services.
May 18, 2023 · In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform ...
A modular and responsive Risk Assessment System based on HiRAM, called HiRAM‐RAS, is realized and evaluated in a real‐world IIoT cloud platform and ...
Aug 12, 2023 · To solve the above problems, this paper first considers the special network security requirements of the IIoT, and proposes a quantitative ...
Dive into the research topics of '3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud'. Together they form a ...