共 9 条
- [1] Albrecht K, 2013, IEEE TECHNOL SOC MAG, V32, P31, DOI 10.1109/MTS.2013.2291170
- [2] Cheema R., 2012, INT J COMPUTER SCI E, V2, P79
- [3] Del Giudice M, 2016, BUS PROCESS MANAG J, V22
- [4] HyunHo Kim, 2015, Information Science and Applications, P509, DOI 10.1007/978-3-662-46578-3_60
- [5] Iung B, 2006, ANN CIRP, V54, P5, DOI [10.1016/S0007-8506(07)60037-7, DOI 10.1016/S0007-8506(07)60037-7]
- [7] Security Threats to the Platform Identification [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 547 - 550
- [8] Li W, 2013, SPRINGER SERIES ADV, DOI [10.1007/978-1-4471-4935-4, DOI 10.1007/978-1-4471-4935-4]
- [9] Security aspects in Cloud based condition monitoring of machine tools [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2015, 38 : 47 - 52