The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1016/j.procir.2016.03.059
|View full text |Cite
|
Sign up to set email alerts
|

The Challenges of Cybersecurity Frameworks to Protect Data Required for the Development of Advanced Maintenance

Abstract: The main objective of the paper is to highlight the important aspects of the data management in condition monitoring and maintenance, especially when the emergent technologies, such as the cloud computing and big data, are to be considered in the maintenance department. In addition, one of the main data management elements highlighted in the current work are the cybersecurity issues which might be one of the biggest obstacles hindering the development of cloud based big data for condition-based maintenance (CB… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…e reason why this works is illustrated in Figure 5(C). For example, if C 1 contains an encryption of 1100 (2) (4 bits) and C 2 contains 1010 (2) , we can see that a carry is generated as a result of adding the 1's complements of C 1 and C 2 . Based on this, we can confirm that C 1 > C 2 .…”
Section: Comparator (Comp)mentioning
confidence: 99%
See 4 more Smart Citations
“…e reason why this works is illustrated in Figure 5(C). For example, if C 1 contains an encryption of 1100 (2) (4 bits) and C 2 contains 1010 (2) , we can see that a carry is generated as a result of adding the 1's complements of C 1 and C 2 . Based on this, we can confirm that C 1 > C 2 .…”
Section: Comparator (Comp)mentioning
confidence: 99%
“…One significant difference of this approach from IEEE 754 is that the value of the mantissa is assumed to be in the range [0, 1). is is because the HEAAN operation works better when the hidden plaintext in the ciphertext in [0, 1) than [1,2). Figure 6 shows the procedure on how a single floatingpoint number is encrypted using three ciphertexts.…”
Section: Heaan-basedmentioning
confidence: 99%
See 3 more Smart Citations