Downloads provided by UsageCounts
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4 (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing) related to the 1st version of integrated platform of the project. It describes and demonstrates the various technologies that form the COLLABS Level-3 security package for secure digital supply networks.
Secure data sharing, secure data flow, anomaly detection, statistical analytics, IIoT, digital supply chain, Secure data sharing, secure data flow, anomaly detection, statistical analytics, IIoT, digital supply chain
Secure data sharing, secure data flow, anomaly detection, statistical analytics, IIoT, digital supply chain, Secure data sharing, secure data flow, anomaly detection, statistical analytics, IIoT, digital supply chain
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 7 |

Views provided by UsageCounts
Downloads provided by UsageCounts