Refine
Year of publication
Document type
- Article (peer-reviewed) (26) (remove)
Is part of the Bibliography
- Yes (26)
Keywords
- Industry 4.0 (4)
- Machine learning (4)
- Blockchain (3)
- Cloud computing (3)
- Predictive maintenance (3)
- Security (3)
- Agents (2)
- Chronicle mining (2)
- Deep learning (2)
- IoT (2)
- Knowledge-based system (2)
- Manufacturing process (2)
- Resource discovery (2)
- Address distribution (1)
- Assessment (1)
- Audit (1)
- Authentication (1)
- Authentication technologies (1)
- Authorization (1)
- Availability (1)
- Biometrics (1)
- Cloud audit (1)
- Cloud audits (1)
- Cloud forensic challenges (1)
- Cloud forensic solutions (1)
- Cloud security (1)
- Condition monitoring (1)
- Continuous authentication (1)
- Cooperative intelligent transportation systems (C-ITS) (1)
- Cross authentication (1)
- Cybersecurity (1)
- DHT (1)
- Decentralized architecture (1)
- Digital agriculture (1)
- Digital forensics (1)
- Digital health (1)
- Discriminative convolutional neural network (1)
- Distributed ledger (1)
- Dynamic VM creation (1)
- Experience capitalization (1)
- Fault prognostics (1)
- Forensic acquisition (1)
- Forensic analysis (1)
- Industrial blockchain (1)
- Internet der Dinge (1)
- Legacy machines (1)
- MLOps Mlflow DVC (1)
- MUWS (1)
- Maintenance (1)
- Metrics (1)
- NAT traversal (1)
- Ontology (1)
- Ontology reasoning (1)
- P2P (1)
- PaaS (1)
- QoS (1)
- Quality assurance (1)
- Rule base refinement (1)
- SOA (1)
- Security policies (1)
- Self adaptive algorithm (1)
- Semantic technology (1)
- Semantics (1)
- Shear wave elastography (1)
- Shibboleth (1)
- Shop floor (1)
- Sicherheit (1)
- Smart farming (1)
- Transparent authentication (1)
- Trust (1)
- Trust management (1)
- Ultrasound (1)
- Usability (1)
- User authentication (1)
- Verifiability (1)
- WSDM (1)
- Web Service Ping (1)
- Web Services (1)
- XAI (1)
- e-Learning (1)
- eHealth/mHealth (1)