1 |
LI B H, CHAI X D, HOU B C, et al Cloud manufacturing system 3.0—a new intelligent manufacturing system in the “Intelligent+” era.. Computer Integrated Manufacturing System, 2019, 25 (12): 2997- 3012.
|
2 |
XIAO W L, ZHANG K Y, WANG S P, et al STEP-NC enabled edge-cloud collaborative manufacturing system for compliant CNC machining. Journal of Manufacturing Systems, 2024, 72, 460- 474.
doi: 10.1016/j.jmsy.2023.12.005
|
3 |
EHSAN M, MASOOD F, MORTEZA G, et al A framework for throughput bottleneck analysis using cloud-based cyber-physical systems in Industry 4. 0 and smart manufacturing. Procedia Computer Science, 2024, 232, 3121- 3130.
doi: 10.1016/j.procs.2024.02.128
|
4 |
LI B H, CHAI X D, ZHANG L, et al Accelerate the development of intelligent manufacturing technologies, industries, and application under the guidance of a new generation of artistic intelligence technology. Engineering Sciences, 2018, 20 (4): 81- 86.
|
5 |
XIANG F, ZHOU P, ZUO Y, et al Manufacturing service network of digital twin systems under cloud computing environment. Procedia CIRP, 2022, 109, 460- 465.
doi: 10.1016/j.procir.2022.05.318
|
6 |
XU H Analysis of industrial Internet security problems and countermeasures in the 5G era. Network Security Technology and Application, 2024, 3, 86- 87.
|
7 |
CHENG M, LI S M, WANG Y H, et al A new model for network security situation assessment of the industrial internet. Computers, Materials and Continua, 2023, 75 (2): 2527- 2555.
doi: 10.32604/cmc.2023.036427
|
8 |
LIU X X, ZHANG J X, YIN W, et al Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Computers and Security, 2021, 102, 102138.
doi: 10.1016/j.cose.2020.102138
|
9 |
WANG F Research on optimization algorithms for artificial intelligence network security management based on All IP internet of things fusion technology. Computers and Electrical Engineering, 2024, 115, 109105.
doi: 10.1016/j.compeleceng.2024.109105
|
10 |
HUANG T X, DU B, LI C H, et al Strong identity authentication and key agreement protocol for industrial Internet. Network Security Technology and Application, 2024, (2): 22- 25.
|
11 |
NIMISH M, SK H I, SHERALI Z A survey on security and cryptographic perspective of industrial-internet-of-things. Internet of Things, 2024, 25, 101037.
doi: 10.1016/j.iot.2023.101037
|
12 |
GUO Y M, GUO Y J, ZHANG C D, et al A provably secure and practical end-to-end authentication scheme for tactile industrial internet of things. Pervasive and Mobile Computing, 2024, 98, 101877.
doi: 10.1016/j.pmcj.2024.101877
|
13 |
GIOVANNI S, ANNALISA N, FLAVIO F, et al A comprehensive survey on the security of low power wide area networks for the internet of things. ICT Express, 2024, 3 (10): 519- 552.
|
14 |
IZHAR A K, MARWA K, DECHANG P, et al Enhancing IoT networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Networks, 2022, 134, 102930.
doi: 10.1016/j.adhoc.2022.102930
|
15 |
Farallon Technology Group. Zero trust manufacturing-how to navigate complex supply chains to build trusted IoT terminals. https://www. keyfactor. com.
|
16 |
LI P Y, XIA J Q, WANG Q, et al Secure architecture for industrial edge of things (IEoT): a hierarchical perspective. Computer Networks, 2024, 251, 110641.
doi: 10.1016/j.comnet.2024.110641
|
17 |
DJAMEL E K, ABDELMADJID B, HICHAM L Internet of things security: a top-down survey. Computer Networks, 2018, 141, 199- 221.
doi: 10.1016/j.comnet.2018.03.012
|
18 |
FLAUZAC O, GONZALEZ C New security architecture for IoT network. Procedia Computer Science, 2015, 52, 1028- 1033.
doi: 10.1016/j.procs.2015.05.099
|
19 |
HUANG S, HUANG B Q Cloud manufacturing platform security architecture. Computer Integrated Manufacturing Systems, 2018, 24 (4): 851- 860.
|
20 |
WU J X. Endogenous security in the cyberspace: mimic defense and generalized robust control. Beijing: Science Press, 2020. (in Chinese)
|
21 |
WANG H Z, LIU J W Current status and key technologies of network endogenous security research. ZTE Technology Journal, 2022, 28 (6): 2- 11.
|
22 |
QI X D. Vulnerability. Shanghai: Tongji University Press, 2021. (in Chinese)
|
23 |
MUHAMMAD A A, SIDRAH A, YUSSUF H A, et al Verify and trust: a multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 2024, 27, 101227.
doi: 10.1016/j.iot.2024.101227
|
24 |
MAHREEN S, WARSI M R, SAIFUL I Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. Journal of Information Security and Applications, 2023, 72, 103389.
doi: 10.1016/j.jisa.2022.103389
|
25 |
ZHANG J C, ZHENG J, ZHANG Z, et al ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks. Computer Networks, 2024, 245, 110376.
doi: 10.1016/j.comnet.2024.110376
|
26 |
WU Q L, KONG S, HAN F Building a modern security protection architecture for enterprises based on the zero trust concept. Information and Communication Technology, 2021, 15 (6): 26- 31.
|
27 |
LUCA F, FEDERICO M, MAURO A, et al Survivable zero trust for cloud computing environments. Computers and Security, 2021, 110, 102419.
doi: 10.1016/j.cose.2021.102419
|
28 |
BI J, LIN Y Z, DONG Q X, et al Large-scale water quality prediction with integrated deep neural network. Information Sciences, 2021, 571, 191- 205.
doi: 10.1016/j.ins.2021.04.057
|
29 |
BIN Z, CHENG J S, ZHANG Z H, et al Degradation prediction model for proton exchange membrane fuel cells based on long short-term memory neural network and Savitzky-Golay filter. International Journal of Hydrogen Energy, 2021, 46 (29): 15928- 15937.
doi: 10.1016/j.ijhydene.2021.02.069
|
30 |
MA B, JIA J, DONG G WAGAN: industrial control sensor data anomaly detection method based on wavelet transform and attention mechanism. Journal of Chinese Computer Systems, 2023, 44 (1): 168- 176.
|
31 |
BI J, ZHANG X, YUAN H T, et al A hybrid prediction method for realistic network traffic with temporal convolutional network and LSTM. IEEE Trans. on Automation Science and Engineering, 2022, 19 (3): 1869- 1879.
doi: 10.1109/TASE.2021.3077537
|