Skip to main navigation
Skip to search
Skip to main content
Sort by
Keyphrases
Cyber-attacks
100%
Cybersecurity Risk
66%
Smart Manufacturing
58%
Cumulative Sum Chart
50%
Advanced Manufacturing Technologies
50%
Manufacturing Cybersecurity
50%
International Journals
50%
Digital Twin Framework
50%
Community-based
50%
Ontological Framework
50%
Additive Manufacturing
50%
Control Chart Method
50%
Automated Part Inspection
50%
Lessons Learned
50%
In-space Manufacturing
50%
Solidification Microstructure
50%
Production Work
50%
COVID-19 Pandemic
50%
Connecting Parts
50%
Product-oriented
50%
Generalized Likelihood Ratio Test
50%
Machining System
50%
Attack Design
50%
Cumulative Sum Control Chart
50%
Manufacturing 4.0
50%
Tool Interoperability
50%
Security Vulnerabilities
50%
Vulnerability
50%
Vulnerability Classification
50%
Cyber-physical Security
50%
Vulnerability Detection
50%
Defense-in-depth Strategy
41%
Exponential CUSUM
37%
Cyber-physical
33%
Smart Manufacturing Systems
33%
Attack Taxonomy
25%
Sintered Parts
25%
Extrusion Additive Manufacturing
25%
Reject Rate
25%
Majority Voting Ensemble
25%
Third-party Testing
25%
Manufacturing Systems
25%
Attack Path
21%
Attack Graph
21%
Quality Deviations
16%
IT Security
16%
Embedded Sensing
16%
Manufacturing Quality Control
16%
Process Domains
16%
Makerspaces
16%
Computer Science
Cybersecurity
100%
Additive Manufacturing
64%
Use Case
50%
Spatial Density
50%
Cyberattack
50%
Machine Learning
50%
Learning System
50%
Security Vulnerability
50%
Physical Security
50%
Driven Framework
50%
Inspection System
50%
Industry 4.0
25%
Attack Taxonomy
25%
Physical Damage
25%
Process Monitoring
25%
Mitigation Strategy
25%
Threat Model
25%
Attack Analysis
25%
Inspection Process
25%
Classification Scheme
25%
Kill Chain
25%
Computational Logic
25%
Physical Vulnerability
25%
Define Vulnerability
25%
Information Systems
25%
Physical Dimension
25%
Discrete Manufacturing
21%
Majority Voting
21%
Physical Threat
16%
Numerical Control
14%
Cascading Effect
14%
Stored Knowledge
14%
Case Study
14%
Learning Framework
14%
Statistical Process
12%
Protective Equipment
12%
Quantitative Comparison
12%
Production Efficiency
12%
3D Printing
12%
Potential Attack Vector
8%
Assessing Security
8%
Cybersecurity Framework
8%
Target Location
8%
Physical Asset
8%
Risk Mitigation Strategy
8%
Physical Product
8%
Development Tool
8%
Stepping Stone
8%
Potential Consequence
8%
Knowledge Base
8%
Engineering
Point Cloud
100%
Additive Manufacturing
85%
Physical Attack
50%
Cyber Attack
50%
Personal Protective Equipment
50%
Data Series
50%
Photodiode
50%
Powder Bed Fusion
50%
Learning System
50%
Reverse Engineering
50%
Spatial Correlation
30%
Data Point
26%
Successful Attack
25%
Likelihood Ratio
25%
Product Design Process
25%
Machining Time
25%
Physical Damage
25%
Isolated System
25%
Smart Manufacturing
25%
Laser Scanner
25%
Manufacturing Process Control
25%
Sintered Part
20%
Part Surface
18%
3D Printing
16%
Production Method
16%
Build Time
16%
Additive Manufacturing Process
16%
Sensor Data
14%
Process Simulation
14%
Computer Aided Design
14%
Geometric Distortion
14%
Postprocessing Operation
12%
Relative Position
10%
Modeling Error
10%
Physical Meaning
10%
Data Model
10%
Process Monitoring
10%
Process Variable
10%
Gaussians
10%
Feedstock Powder
10%
Process Control
10%
Prediction Error
10%
Feedstock Material
10%
Cutting Force
10%
Simulated Data
10%
Statistical Data
10%
Collected Data
8%
Control Strategy
8%
Quality Control
8%
Gas Fuel Manufacture
8%