2022
DOI: 10.18280/jesa.550512
|View full text |Cite
|
Sign up to set email alerts
|

Reference Architecture for CIM the Bi-Level Architecture for Efficient Manufacturing BLAEM

Abstract: The combination of innovative advance and fluctuating client needs are paving the way to continuous changes in the manufacturing environments. As a result, mechanical enterprises aim for the honing of their processes by means of Computer Integrated Manufacturing (CIM). Their holy grail is connecting the shop floor systems to the high business layer systems. Based on our previous literature review on the CIM architectures available in the literature, we have identified six major aspects and detected the limitat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Traffic control and analysis: An Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) have to be in place in order to monitor and control the network and the systems for malicious activities such as Advanced Persistent Threat and infections that can be caused by Misconfigurations and Network Flaws. In Table 3 we listed all the guidelines, and we specified for each guideline the list of threats it can cover and the vulnerabilities it can fix, this specification has been done based on the cyber-security standards and technical experimentations [43].…”
Section: Account Management: a Strong Account Managementmentioning
confidence: 99%
“…Traffic control and analysis: An Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) have to be in place in order to monitor and control the network and the systems for malicious activities such as Advanced Persistent Threat and infections that can be caused by Misconfigurations and Network Flaws. In Table 3 we listed all the guidelines, and we specified for each guideline the list of threats it can cover and the vulnerabilities it can fix, this specification has been done based on the cyber-security standards and technical experimentations [43].…”
Section: Account Management: a Strong Account Managementmentioning
confidence: 99%