-
1
-
-
84939806735
-
An autonomous self-aware and adaptive fault tolerant routing technique for wireless sensor networks
-
PMID:26295236
-
Abba, S., & Lee, J.-A. (2015). An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks. Sensors (Basel, Switzerland), 15(8), 20316-20354. doi:10.3390/s150820316 PMID:26295236
-
(2015)
Sensors (Basel, Switzerland)
, vol.15
, Issue.8
, pp. 20316-20354
-
-
Abba, S.1
Lee, J.-A.2
-
2
-
-
85020924934
-
-
Retrieved from
-
Atos. (2012). The convergence of IT and Operational Technology. Retrieved from https://atos.net/content/dam/global/ascent-whitepapers/ascent-whitepaper-the-convergence-of-it-and-operational-technology.pdf
-
(2012)
The Convergence of IT and Operational Technology
-
-
-
3
-
-
85020945216
-
-
Bartezzaghi, E., Cagliano, R., Caniato, F., & Ronchi, S. (2016). A Journey through Manufacturing and Supply Chain Strategy Research.
-
(2016)
A Journey Through Manufacturing and Supply Chain Strategy Research
-
-
Bartezzaghi, E.1
Cagliano, R.2
Caniato, F.3
Ronchi, S.4
-
5
-
-
84931374875
-
Big data in exploration and production: Real-time adaptive analytics and data-flow architecture
-
Paper Presented at the
-
Brule, M. R. (2013). Big data in exploration and production: Real-time adaptive analytics and data-flow architecture. Paper presented at the SPE Digital Energy Conference. doi:10.2118/163721-MS
-
(2013)
SPE Digital Energy Conference
-
-
Brule, M.R.1
-
6
-
-
1842590189
-
Conflict and trust between attorney and client
-
Burt, R. A. (1980). Conflict and Trust Between Attorney and Client. Geological Journal, 69, 1015.
-
(1980)
Geological Journal
, vol.69
, pp. 1015
-
-
Burt, R.A.1
-
7
-
-
83055186748
-
-
Information and Privacy Commissioner of Ontario. Retrieved from
-
Cavoukian, A. (2009). Privacy by Design-The 7 Foundational Principles. Information and Privacy Commissioner of Ontario. Retrieved from https://www.iab.org/wp-content/IAB-uploads/2011/03/fred-carter.pdf
-
(2009)
Privacy by Design-The 7 Foundational Principles
-
-
Cavoukian, A.1
-
8
-
-
85020921679
-
Adaptive mobile cloud workflow management system for service discovery in proximity-based internet of things
-
Chang, C., Srirama, S. N., & Mass, J. (2015). Adaptive Mobile Cloud Workflow Management System for Service Discovery in Proximity-based Internet of Things. International Journal of Services Computing, 3(4), 1-13.
-
(2015)
International Journal of Services Computing
, vol.3
, Issue.4
, pp. 1-13
-
-
Chang, C.1
Srirama, S.N.2
Mass, J.3
-
9
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., & Sudan, M. (1998). Private information retrieval. Journal of the ACM, 45(6), 965-981. doi:10.1145/293347.293350
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
84906834039
-
Internet of things in industries: A survey
-
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233-2243. doi:10.1109/TII.2014.2300753
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.4
, pp. 2233-2243
-
-
Da Xu, L.1
He, W.2
Li, S.3
-
11
-
-
84869487494
-
Smart manufacturing, manufacturing intelligence and demand-dynamic performance
-
Davis, J., Edgar, T., Porter, J., Bernaden, J., & Sarli, M. (2012). Smart manufacturing, manufacturing intelligence and demand-dynamic performance. Computers & Chemical Engineering, 47, 145-156. doi:10.1016/j.compchemeng.2012.06.037
-
(2012)
Computers & Chemical Engineering
, vol.47
, pp. 145-156
-
-
Davis, J.1
Edgar, T.2
Porter, J.3
Bernaden, J.4
Sarli, M.5
-
12
-
-
84903134983
-
Industrie 4.0: Hit or hype? (industry forum)
-
Drath, R., & Horch, A. (2014). Industrie 4.0: Hit or hype? (industry forum). IEEE industrial electronics magazine, 8(2), 56-58.
-
(2014)
IEEE Industrial Electronics Magazine
, vol.8
, Issue.2
, pp. 56-58
-
-
Drath, R.1
Horch, A.2
-
14
-
-
84945908211
-
-
ENISA. Retrieved from
-
ENISA. (2015). Privacy and Data Protection by Design. Retrieved from https://www.enisa.europa.eu/publications/privacy-and-data-protection-by-design
-
(2015)
Privacy and Data Protection by Design
-
-
-
19
-
-
0002337124
-
How to play ANY mental game
-
Paper Presented at the, New York, NY
-
Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play ANY mental game. Paper presented at the nineteenth annual ACM symposium on Theory of computing, New York, NY.
-
(1987)
Nineteenth Annual ACM Symposium on Theory of Computing
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
85020942345
-
-
Google Patents
-
Grammer, G., Joshi, S., Kroeschel, W., Kumar, S., Sathi, A., & Viswanathan, M. (2007). Obfuscating sensitive data while preserving data usability. Google Patents.
-
(2007)
Obfuscating Sensitive Data while Preserving Data Usability
-
-
Grammer, G.1
Joshi, S.2
Kroeschel, W.3
Kumar, S.4
Sathi, A.5
Viswanathan, M.6
-
21
-
-
79953035470
-
A neural network approach for data masking
-
Gujjary, V. A., & Saxena, A. (2011). A neural network approach for data masking. Neurocomputing, 74(9), 1497-1501. doi:10.1016/j.neucom.2011.01.002
-
(2011)
Neurocomputing
, vol.74
, Issue.9
, pp. 1497-1501
-
-
Gujjary, V.A.1
Saxena, A.2
-
27
-
-
84949084892
-
Classification of privacy management techniques in pervasive computing
-
Kurkovsky, O. R., & Bhalodi, J. (2007). Classification of privacy management techniques in pervasive computing. International Journal of u-and e-Service. Science and Technology, 11(1), 55-71.
-
(2007)
International Journal of U-and E-Service. Science and Technology
, vol.11
, Issue.1
, pp. 55-71
-
-
Kurkovsky, O.R.1
Bhalodi, J.2
-
28
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Paper Presented at the
-
Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments. Paper presented at the international conference on Ubiquitous Computing. doi:10.1007/3-540-45809-3-19
-
(2002)
International Conference on Ubiquitous Computing
-
-
Langheinrich, M.1
-
29
-
-
85020939616
-
-
Retrieved from
-
Leiva, C. (2016). Using integration standards in smart manufacturing. Retrieved from http://www.controleng.com/single-article/using-integration-standards-in-smart-manufacturing/5a6324fb1a1feaa8eb64a57bd59ab137.html
-
(2016)
Using Integration Standards in Smart Manufacturing
-
-
Leiva, C.1
-
30
-
-
84949521136
-
Securing smart maintenance services: Hardware-security and TLS for MQTT
-
Paper Presented at the
-
Lesjak, C., Hein, D., Hofmann, M., Maritsch, M., Aldrian, A., Priller, P., ⋯ Pregartner, G. (2015). Securing smart maintenance services: Hardware-security and TLS for MQTT. Paper presented at the 2015 IEEE 13th International Conference on Industrial Informatics. doi:10.1109/INDIN.2015.7281913
-
(2015)
2015 IEEE 13th International Conference on Industrial Informatics
-
-
Lesjak, C.1
Hein, D.2
Hofmann, M.3
Maritsch, M.4
Aldrian, A.5
Priller, P.6
Pregartner, G.7
-
32
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1), 3, es. doi:10.1145/1217299.1217302
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
33
-
-
85020942045
-
Hacker's delight: Law firm risk and liability in the cyber age
-
McNerney, M., & Papadopoulos, E. (2012). Hacker's Delight: Law Firm Risk and Liability in the Cyber Age. Am. UL Rev., 62, 1243.
-
(2012)
Am. UL Rev.
, vol.62
, pp. 1243
-
-
McNerney, M.1
Papadopoulos, E.2
-
36
-
-
84952938645
-
Industrial internet of things: Unleashing the potential of connected products and services
-
Paper Presented at the
-
O'Halloran, D., & Kvochko, E. (2015). Industrial Internet of Things: Unleashing the Potential of Connected Products and Services. Paper presented at the World Economic Forum.
-
(2015)
World Economic Forum
-
-
O'Halloran, D.1
Kvochko, E.2
-
37
-
-
84885440824
-
Trusted platform module evolution
-
Osborn, J. D., & Challener, D. C. (2013). Trusted platform Module evolution. Johns Hopkins APL Technical Digest, 32(2), 536-543.
-
(2013)
Johns Hopkins APL Technical Digest
, vol.32
, Issue.2
, pp. 536-543
-
-
Osborn, J.D.1
Challener, D.C.2
-
39
-
-
85006184584
-
A survey on internet of things from industrial market perspective
-
Perera, C., Liu, C. H., Jayawardena, S., & Chen, M. (2014). A survey on internet of things from industrial market perspective. IEEE Access, 2, 1660-1679. doi:10.1109/ACCESS.2015.2389854
-
(2014)
IEEE Access
, vol.2
, pp. 1660-1679
-
-
Perera, C.1
Liu, C.H.2
Jayawardena, S.3
Chen, M.4
-
40
-
-
85020939432
-
-
arXiv preprint arXiv:1609.04060
-
Perera, C., McCormick, C., Bandara, A. K., Price, B. A., & Nuseibeh, B. (2016). Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. arXiv preprint arXiv:1609.04060
-
(2016)
Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms
-
-
Perera, C.1
McCormick, C.2
Bandara, A.K.3
Price, B.A.4
Nuseibeh, B.5
-
41
-
-
85020939400
-
10 reasons why your organization needs data loss prevention
-
Retrieved from
-
Poarch, D., Grahn, A., Park, D., & Martin, G. (2015). 10 Reasons Why Your Organization Needs Data Loss Prevention. IT focus area: security. Retrieved from http://focus.forsythe.com/articles/19/10-Reasons-Why-Your-Organization-Needs-Data-Loss-Prevention
-
(2015)
IT Focus Area: Security
-
-
Poarch, D.1
Grahn, A.2
Park, D.3
Martin, G.4
-
42
-
-
84856132606
-
A survey on recent trends, process and development in data masking for testing
-
Ravikumar, G., Manjunath, T., Ravindra, S., & Umesh, I. (2011). A survey on recent trends, process and development in data masking for testing. International Journal of Computer Science Issues, 8(2), 535-544.
-
(2011)
International Journal of Computer Science Issues
, vol.8
, Issue.2
, pp. 535-544
-
-
Ravikumar, G.1
Manjunath, T.2
Ravindra, S.3
Umesh, I.4
-
47
-
-
84959480305
-
Intelligent big data analysis architecture based on automatic service composition
-
Paper Presented at the
-
Siriweera, T., Paik, I., Kumara, B. T., & Koswatta, K. (2015). Intelligent Big Data Analysis Architecture Based on Automatic Service Composition. Paper presented at the 2015 IEEE International Congress on Big Data. doi:10.1109/BigDataCongress.2015.46
-
(2015)
2015 IEEE International Congress on Big Data
-
-
Siriweera, T.1
Paik, I.2
Kumara, B.T.3
Koswatta, K.4
-
51
-
-
84979814404
-
-
arXiv preprint arXiv:1601.04301
-
Ulltveit-Moe, N., Nergaard, H., Erdödi, L., Gjøsæter, T., Kolstad, E., & Berg, P. (2016). Secure Information Sharing in an Industrial Internet of Things. arXiv preprint arXiv:1601.04301
-
(2016)
Secure Information Sharing in An Industrial Internet of Things
-
-
Ulltveit-Moe, N.1
Nergaard, H.2
Erdödi, L.3
Gjøsæter, T.4
Kolstad, E.5
Berg, P.6
-
52
-
-
0001542461
-
Vendor-managed inventory in the retail supply chain
-
Waller, M., Johnson, M. E., & Davis, T. (1999). Vendor-managed inventory in the retail supply chain. Journal of business logistics, 20(1), 183.
-
(1999)
Journal of Business Logistics
, vol.20
, Issue.1
, pp. 183
-
-
Waller, M.1
Johnson, M.E.2
Davis, T.3
-
53
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Paper Presented at the
-
Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. Paper presented at the 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS). doi:10.1109/ICDCS.2010.34
-
(2010)
2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS)
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
54
-
-
85020849568
-
-
Wang, S., Fan, C., Hsu, C.-H., Sun, Q., & Yang, F. (2014). A vertical handoff method via self-selection decision tree for internet of vehicles.
-
(2014)
A Vertical Handoff Method Via Self-selection Decision Tree for Internet of Vehicles
-
-
Wang, S.1
Fan, C.2
Hsu, C.-H.3
Sun, Q.4
Yang, F.5
-
55
-
-
84937468993
-
Collaboration reputation for trustworthy web service selection in social networks
-
Wang, S., Huang, L., Hsu, C.-H., & Yang, F. (2016). Collaboration reputation for trustworthy Web service selection in social networks. Journal of Computer and System Sciences, 82(1), 130-143. doi:10.1016/j.jcss.2015.06.009
-
(2016)
Journal of Computer and System Sciences
, vol.82
, Issue.1
, pp. 130-143
-
-
Wang, S.1
Huang, L.2
Hsu, C.-H.3
Yang, F.4
-
56
-
-
84949032526
-
Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems
-
Wang, S., Lei, T., Zhang, L., Hsu, C.-H., & Yang, F. (2016). Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems. Future Generation Computer Systems, 61, 118-127. doi:10.1016/j.future.2015.10.004
-
(2016)
Future Generation Computer Systems
, vol.61
, pp. 118-127
-
-
Wang, S.1
Lei, T.2
Zhang, L.3
Hsu, C.-H.4
Yang, F.5
-
57
-
-
84944038188
-
Reputation measurement and malicious feedback rating prevention in web service recommendation systems
-
Wang, S., Zheng, Z., Wu, Z., Lyu, M. R., & Yang, F. (2015). Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Transactions on Services Computing, 8(5), 755-767. doi:10.1109/TSC.2014.2320262
-
(2015)
IEEE Transactions on Services Computing
, vol.8
, Issue.5
, pp. 755-767
-
-
Wang, S.1
Zheng, Z.2
Wu, Z.3
Lyu, M.R.4
Yang, F.5
-
58
-
-
84904109669
-
Towards self-awareness privacy protection for internet of things data collection
-
Wong, K.-S., & Kim, M. H. (2014). Towards Self-Awareness Privacy Protection for Internet of Things Data Collection. Journal of Applied Mathematics, 9. doi:10.1155/2014/827959
-
(2014)
Journal of Applied Mathematics
, vol.9
-
-
Wong, K.-S.1
Kim, M.H.2
-
59
-
-
84942032371
-
Towards a respondent-preferred ki-anonymity model
-
Wong, K.-S., & Kim, M. H. (2015). Towards a respondent-preferred ki-anonymity model. Frontiers of Information Technology & Electronic Engineering, 16(9), 720-731. doi:10.1631/FITEE.1400395
-
(2015)
Frontiers of Information Technology & Electronic Engineering
, vol.16
, Issue.9
, pp. 720-731
-
-
Wong, K.-S.1
Kim, M.H.2
-
60
-
-
85020939836
-
Data protection in the industrial internet of things
-
Paper Presented at the, Zhangjiajie, China
-
Wong, K.-S., & Kim, M. H. (2016). Data Protection in the Industrial Internet of Things. Paper presented at the International Conference on IoT (S2 ICIOT), Zhangjiajie, China.
-
(2016)
International Conference on IoT (S2 ICIOT)
-
-
Wong, K.-S.1
Kim, M.H.2
-
62
-
-
84921416016
-
Detecting industrial control malware using automated PLC code analytics
-
Zonouz, S., Rrushi, J., & McLaughlin, S. (2014). Detecting industrial control malware using automated PLC code analytics. IEEE Security and Privacy, 12(6), 40-47. doi:10.1109/MSP.2014.113
-
(2014)
IEEE Security and Privacy
, vol.12
, Issue.6
, pp. 40-47
-
-
Zonouz, S.1
Rrushi, J.2
McLaughlin, S.3
|