Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Title Cybersecurity for industry 4.0 : analysis for design and manufacturing / Lane Thames, Dirk Schaefer, editors.
Imprint Cham, Switzerland : Springer, [2017]
2017.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Series Springer series in advanced manufacturing.
Springer series in advanced manufacturing.
Subject Computer security.
Alt Name Thames, Lane,
Schaefer, Dirk, 1961-
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Series Springer series in advanced manufacturing.
Springer series in advanced manufacturing.
Subject Computer security.
Alt Name Thames, Lane,
Schaefer, Dirk, 1961-
Description 1 online resource : illustrations.
polychrome rdacc
Bibliography Note Includes bibliographical references.
Contents Preface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation.
5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment.
2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based Authorization Algorithm; 3.2.2 Customized Geometric Transformation Algorithm; 4 Case Study for Approach Validation; 5 Conclusion and Future Works; Acknowledgements; References; 3 A New Approach to Cyberphysical Security in Industry 4.0.
Abstract1 Introduction; 2 Background; 3 Secure Manufacturing Information Architecture; 3.1 Pilot of Direct-to-Machine Security; 4 Manufacturing Security Enforcement Device; 5 Pilot of the Manufacturing Security Enforcement Device; 6 Conclusion; Acknowledgements; References; 4 SCADA System Forensic Analysis Within IIoT; 1 Introduction; 1.1 SCADA Progression and the Development of IIoT; 2 Conceptual Architecture of a SCADA System; 2.1 SCADA Hardware; 2.2 SCADA Software; 2.3 Networking; 3 Examples of SCADA System Incidents Prior to IIoT; 3.1 Trans-Siberian Pipeline Explosion.
3.2 Maroochy Shire Water System3.3 Stuxnet; 3.4 Duqu; 3.5 Flame; 4 SCADA Forensics Within IIoT; 4.1 Forensic Challenges; 4.2 Current Data Acquisition Methods for SCADA Systems; 5 Forensic Acquisition of SCADA Artefacts; 5.1 Network Data Acquisition; 5.2 Device Data Acquisition; 5.3 Half-Life of Data Within a SCADA System; 6 SCADA Forensic Process; 6.1 Existing Incident Response Models; 6.2 Forensic Methodology for SCADA Within IIoT; 6.3 SCADA Forensic Workstation; 7 Conclusion; 8 List of Abbreviations; References; 5 Big Data Security Intelligence for Healthcare Industry 4.0; Abstract.
Note Vendor-supplied metadata.
Summary This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity.
ISBN 9783319506609 (electronic bk.)
3319506609 (electronic bk.)
9783319506593
3319506595
ISBN/ISSN 10.1007/978-3-319-50660-9
OCLC # 981764911
Additional Format Print version: Cybersecurity for industry 4.0. Cham, Switzerland : Springer, [2017] 3319506595 9783319506593 (OCoLC)962831090.


If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team