Open Access
Issue
SHS Web Conf.
Volume 91, 2021
Innovative Economic Symposium 2020 – Stable Development in Unstable World (IES2020)
Article Number 01033
Number of page(s) 10
Section Stable Development in Unstable World
DOI https://doi.org/10.1051/shsconf/20219101033
Published online 14 January 2021
  1. Ch. Roser. AllAboutLean. Organize Your Industry [online], Available at: https://www.allaboutlean.com/christoph-roser/ (2020). [Google Scholar]
  2. I. Veza, M. Mladineo, I. Peko, Analysis of the Current state of Croatian Manufacturing Industry with Regard to Industry 4.0. 15th International Scientific Conference on Production Engineering (CIM 2015), 15 (2015). [Google Scholar]
  3. K. Schwab. The Fourth Industrial Revolution: what it means, how to respond [online], Available at: https://professionallearning.education.gov.scot/media/1352/the-fourth-industrial-revolution-what-it-means-and-how-to-respond-world-economic-forum.pdf (2016). [Google Scholar]
  4. R.H. Weber, Internet of Things - New security and privacy challenges. Computer Law & Security Review, 26(1), 23-30 (2010). [CrossRef] [Google Scholar]
  5. L. Dvořáková et al., Methodics of SMEs enterprises in tertiary sector adaptation on implementation of principles, procedures, methods and tools of Society 4.0. Pilsen: UWB and ITB (2020). [Google Scholar]
  6. A. Saint, Where next for the internet of things? Engineering & Technology, 10(1), 72-75 (2015). [CrossRef] [Google Scholar]
  7. H. Tran-Dang, N. Krommenacker, P. Charpentier, D.S. Kim, Toward the Internet of Things for Physical Internet: Perspectives and Challenges. IEEE Internet of Things Journal, 7(6), 1 (2020). [CrossRef] [Google Scholar]
  8. D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516 (2012). [CrossRef] [Google Scholar]
  9. A. Jules, RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communication, 24(2), 381-394 (2006). [CrossRef] [Google Scholar]
  10. J. Ye, S. Dobson, S. McKeever, Situation identification techniques in pervasive computing: A review. Pervasive and Mobile Computing, 8(1), 36-66 (2012). [CrossRef] [Google Scholar]
  11. L. Tan, N. Wang, Future internet: The Internet of Things. ICACTE (3rd International Conference on Advanced Computer Theory and Engineering, 3 (2010). [Google Scholar]
  12. R. Aggarwal, M. Las Das, RFID Security in the Context of ‘Internet of Things’. First International Conference on security of Internet of Things, 1 (2012). [Google Scholar]
  13. R. Yugha, S. Chitra, A survey on technologies and security protocols: Reference for future generation IoT. Journal of Network and Computer Applications, 169, 1084-8045 (2020). [CrossRef] [Google Scholar]
  14. M. Mahbub, Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics. Journal of Network and Computer Applications, 168, 1084-8045 (2020). [Google Scholar]
  15. A. Luigi, I. Antonio, M. Giacomo, The Internet of Things: Survey. Computer Networks, 54(15), 2787-2805 (2010). [Google Scholar]
  16. L. Huichen, N.W. Bergmann, IoT Privacy and Security Challenges for Smart Home Environments. Information, 7(3), 44 (2016). [CrossRef] [Google Scholar]
  17. Elsevier B.V. Scopus database [online], Available at: https://www.scopus.com/ (2020). [Google Scholar]
  18. S. Serpa, C.M. Ferreira, Society 5.0 and Sustainability Digital Innovations: A Social Process. Journal of Organizational Culture, Communications and Conflicts, 23(2), 1-14 (2019). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.