{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:29:04Z","timestamp":1742974144617,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030451820"},{"type":"electronic","value":"9783030451837"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45183-7_6","type":"book-chapter","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T23:09:32Z","timestamp":1591225772000},"page":"74-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Smart Cyber-Physical System for Pattern Recognition of Illegal 3D Designs in 3D Printing"],"prefix":"10.1007","author":[{"given":"Anton","family":"Vedeshin","sequence":"first","affiliation":[]},{"given":"John Mehmet Ulgar","family":"Dogru","sequence":"additional","affiliation":[]},{"given":"Innar","family":"Liiv","sequence":"additional","affiliation":[]},{"given":"Sadok Ben","family":"Yahia","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,4]]},"reference":[{"key":"6_CR1","unstructured":"Defense distributed. https:\/\/defcad.com . Accessed 29 Sept 2019"},{"key":"6_CR2","unstructured":"Microsoft azure. http:\/\/azure.microsoft.com . Accessed 25 Sept 2019"},{"key":"6_CR3","unstructured":"Thingiverse. https:\/\/www.thingiverse.com . Accessed 29 Sept 2019"},{"key":"6_CR4","unstructured":"Youmagine. https:\/\/www.youmagine.com . Accessed 28 Sept 2019"},{"key":"6_CR5","unstructured":"All3DP: 2019 3D printed gun digest: all you need to know. all3dp.com, July 2019. https:\/\/all3dp.com\/1\/3d-printed-gun-firearm-weapon-parts\/"},{"key":"6_CR6","unstructured":"Astovasadourian, A., Naro, O., Cabanel, V.: 3-D printing protected by digital rights management. US Patent App. 14\/950,431, 20 April 2017"},{"key":"6_CR7","unstructured":"Badhani, H., Chopra, A., Goel, N.P., Panda, A.S.: Method and apparatus for controlling printability of a 3-dimensional model. US Patent 9,457,518, 4 October 2016"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Buehler, E., et al.: Sharing is caring: assistive technology designs on Thingiverse. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 525\u2013534. ACM (2015)","DOI":"10.1145\/2702123.2702525"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Chebotko, A., Kashlev, A., Lu, S.: A big data modeling methodology for apache Cassandra. In: 2015 IEEE International Congress on Big Data, pp. 238\u2013245. IEEE (2015)","DOI":"10.1109\/BigDataCongress.2015.41"},{"key":"6_CR10","unstructured":"Fabri, A., Teillaud, M.: CGAL-the computational geometry algorithms library. In: 10e colloque national en calcul des structures, p. 6 (2011)"},{"key":"6_CR11","unstructured":"Glasgow, D., MacLaurin, M.B., Sherman, C.E., Ramadge, D.: Digital rights and integrity management in three-dimensional (3D) printing. US Patent 9,595,037, 14 March 2017"},{"key":"6_CR12","first-page":"914","volume":"5","author":"M Holland","year":"2017","unstructured":"Holland, M., Nigischer, C., Stjepandi\u0107, J., Chen, C.: Copyright protection in additive manufacturing with blockchain approach. Transdiscipl. Eng.: Paradigm Shift 5, 914\u2013921 (2017)","journal-title":"Transdiscipl. Eng.: Paradigm Shift"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"44082","DOI":"10.1109\/ACCESS.2018.2864331","volume":"6","author":"JU Hou","year":"2018","unstructured":"Hou, J.U., Kim, D., Ahn, W.H., Lee, H.K.: Copyright protections of digital content in the age of 3D printer: emerging issues and survey. IEEE Access 6, 44082\u201344093 (2018)","journal-title":"IEEE Access"},{"key":"6_CR14","unstructured":"Isbjornssund, K., Vedeshin, A.: Method and system for enforcing 3D restricted rights in a rapid manufacturing and prototyping environment. US Patent App. 13\/973,816, 27 February 2014"},{"key":"6_CR15","unstructured":"Isbj\u00f6rnssund, K., Vedeshin, A.: Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system. US Patent App. 14\/761,588, 3 December 2015"},{"issue":"37","key":"6_CR16","doi-asserted-by":"publisher","first-page":"9570","DOI":"10.1039\/C7TC03348F","volume":"5","author":"ZC Kennedy","year":"2017","unstructured":"Kennedy, Z.C., et al.: Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. J. Mater. Chem. C 5(37), 9570\u20139578 (2017)","journal-title":"J. Mater. Chem. C"},{"issue":"2","key":"6_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.bushor.2014.11.005","volume":"58","author":"J Kietzmann","year":"2015","unstructured":"Kietzmann, J., Pitt, L., Berthon, P.: Disruptions, decisions, and destinations: enter the age of 3-D printing and additive manufacturing. Bus. Horiz. 58(2), 209\u2013215 (2015)","journal-title":"Bus. Horiz."},{"issue":"2","key":"6_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Oper. Syst. Rev. 44(2), 35\u201340 (2010)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"6","key":"6_CR19","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/BF01186929","volume":"12","author":"K Leong","year":"1996","unstructured":"Leong, K., Chua, C., Ng, Y.: A study of stereolithography file errors and repair. Part 1. Generic solution. Int. J. Adv. Manuf. Technol. 12(6), 407\u2013414 (1996)","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Liiv, I.: Visualization and data mining method for inventory classification. In: 2007 IEEE International Conference on Service Operations and Logistics, and Informatics, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/SOLI.2007.4383909"},{"key":"6_CR21","unstructured":"Liiv, I.: Pattern Discovery Using Seriation and Matrix Reordering: A Unified View, Extensions and an Application to Inventory Management. TUT Press, Tallinn (2008)"},{"issue":"2","key":"6_CR22","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1002\/sam.10071","volume":"3","author":"I Liiv","year":"2010","unstructured":"Liiv, I.: Seriation and matrix reordering methods: an historical overview. Stat. Anal. Data Min.: ASA Data Sci. J. 3(2), 70\u201391 (2010)","journal-title":"Stat. Anal. Data Min.: ASA Data Sci. J."},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TCE.2007.339523","volume":"53","author":"NH Lin","year":"2007","unstructured":"Lin, N.H., Huang, T.H., Chen, B.Y.: 3D model streaming based on JPEG 2000. IEEE Trans. Consum. Electron. 53(1), 182\u2013190 (2007)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"6_CR24","unstructured":"Mattingly, T.D., Tovey, D.G., O\u2019brien, J.J.: System and methods for three dimensional printing with blockchain controls. US Patent App. 15\/913,382, 13 September 2018"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-26896-5_5","volume-title":"The Future of Law and eTechnologies","author":"P-M Sepp","year":"2016","unstructured":"Sepp, P.-M., Vedeshin, A., Dutt, P.: Intellectual property protection of 3D printing using secured streaming. In: Kerikm\u00e4e, T., Rull, A. (eds.) The Future of Law and eTechnologies, pp. 81\u2013109. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26896-5_5"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"issue":"2","key":"6_CR27","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0965-9978(99)00046-0","volume":"31","author":"I Stroud","year":"2000","unstructured":"Stroud, I., Xirouchakis, P.: STL and extensions. Adv. Eng. Softw. 31(2), 83\u201395 (2000)","journal-title":"Adv. Eng. Softw."},{"issue":"7\u20139","key":"6_CR28","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1016\/S0895-7177(03)90079-3","volume":"38","author":"M Szilv\u015bi-Nagy","year":"2003","unstructured":"Szilv\u015bi-Nagy, M., Matyasi, G.: Analysis of STL files. Math. Comput. Model. 38(7\u20139), 945\u2013960 (2003)","journal-title":"Math. Comput. Model."},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Vedeshin, A., Dogru, J.M.U., Liiv, I., Draheim, D., Ben Yahia, S.: A digital ecosystem for personal manufacturing: an architecture for cloud-based distributed manufacturing operating systems. In: Proceedings of the 11th International Conference on Management of Digital EcoSystems, MEDES 2019, pp. 224\u2013228. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3297662.3365792","DOI":"10.1145\/3297662.3365792"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"40039","DOI":"10.1109\/ACCESS.2019.2946730","volume":"8","author":"A Vedeshin","year":"2019","unstructured":"Vedeshin, A., Dogru, J.M.U., Liiv, I., Yahia, S.B., Draheim, D.: A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method. IEEE Access 8, 40039\u201340056 (2019)","journal-title":"IEEE Access"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Verma, J.P., Patel, B., Patel, A.: Big data analysis: recommendation system with hadoop framework. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology, pp. 92\u201397. IEEE (2015)","DOI":"10.1109\/CICT.2015.86"},{"key":"6_CR32","first-page":"3","volume":"705","author":"L V\u00f5handu","year":"1989","unstructured":"V\u00f5handu, L.: Fast methods in exploratory data analysis. Trans. TTU 705, 3\u201313 (1989)","journal-title":"Trans. TTU"},{"issue":"6","key":"6_CR33","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1007\/s11948-014-9617-x","volume":"21","author":"G Walther","year":"2015","unstructured":"Walther, G.: Printing insecurity? The security implications of 3D-printing of weapons. Sci. Eng. Ethics 21(6), 1435\u20131445 (2015)","journal-title":"Sci. Eng. Ethics"}],"container-title":["Communications in Computer and Information Science","Smart Applications and Data Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45183-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T22:25:49Z","timestamp":1722983149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45183-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030451820","9783030451837"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45183-7_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SADASC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Applications and Data Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sadasc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sadasc.net","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}