2020
DOI: 10.1007/978-3-030-43887-6_28
|View full text |Cite
|
Sign up to set email alerts
|

Event-Based Predictive Maintenance on Top of Sensor Data in a Real Industry 4.0 Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 14 publications
1
9
0
Order By: Relevance
“…In the misuse detection case, the techniques that have adopted are both knowledge and ML-based, while in the anomaly detection case, it uses ML-based techniques. The algorithms that we support are inspired by predictive SN Computer Science maintenance in Industry 4.0 [28,29] and emphasize on (i) continuously monitoring for known patterns; (ii) continuously monitoring for unusual behavior following an unsupervised learning approach; and (iii) quick and easy model building for new threats at arbitrary combinations of system layers, provided that logs exist. In summary, the novelty of our proposal lies in the novel application of items (ii) and (iii) above in a IDS system and on the provision of a unified solution for monitoring for known patterns, training for new attacks and detecting anomalous behavior without previous training.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…In the misuse detection case, the techniques that have adopted are both knowledge and ML-based, while in the anomaly detection case, it uses ML-based techniques. The algorithms that we support are inspired by predictive SN Computer Science maintenance in Industry 4.0 [28,29] and emphasize on (i) continuously monitoring for known patterns; (ii) continuously monitoring for unusual behavior following an unsupervised learning approach; and (iii) quick and easy model building for new threats at arbitrary combinations of system layers, provided that logs exist. In summary, the novelty of our proposal lies in the novel application of items (ii) and (iii) above in a IDS system and on the provision of a unified solution for monitoring for known patterns, training for new attacks and detecting anomalous behavior without previous training.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…Multiple ML algorithms can be encapsulated in this component. Its main technique is transferred from Industry 4.0 [28,29].…”
Section: Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…There exists extensive literature in the detection of analysis in online settings [1] and multivariate cases [9], but their application in industrial settings is still limited. More specifically, an unsupervised AD approach based on the micro-cluster continuous outlier detection (MCOD) algorithm [13] is evaluated on the same industrial use case as of the current work [18].…”
Section: Introductionmentioning
confidence: 99%