We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks

    The Internet of Things (IoT) has shown incredible adaptability in recent years and has become an integral part of human life. The proliferation of...

    Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil in Cluster Computing
    Article 23 May 2023
  2. A middleware for providing communicability to Embedded MAS based on the lack of connectivity

    An Embedded multi-agent system (Embedded MAS) is an embedded cognitive system based on agents cooperating to control hardware devices. These agents...

    Vinicius Souza de Jesus, Nilson Mori Lazarin, ... José Viterbo in Artificial Intelligence Review
    Article 22 September 2023
  3. CIA Security for Internet of Vehicles and Blockchain-AI Integration

    The lack of data security and the hazardous nature of the Internet of Vehicles (IoV), in the absence of networking settings, have prevented the...

    Tao Hai, Muammer Aksoy, ... Senthilkumar Mohan in Journal of Grid Computing
    Article 02 April 2024
  4. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  5. The Next Big Thing: From Embedded Systems to Embodied Actors

    Traditional engineering is coming to a junction from embedded systems to embodied actors, and with assuring the beneficial and robust behavior of...
    Harald Ruess in Formal Methods
    Conference paper 2023
  6. Embedded 3D reconstruction of dynamic objects in real time for maritime situational awareness pictures

    Assessing the security status of maritime infrastructures is a key factor for maritime safety and security. Facilities such as ports and harbors are...

    Felix Sattler, Borja Carrillo-Perez, ... Gregor Lux in The Visual Computer
    Article Open access 10 March 2023
  7. Embedded Computer Systems: Architectures, Modeling, and Simulation 22nd International Conference, SAMOS 2022, Samos, Greece, July 3–7, 2022, Proceedings

    This book constitutes the proceedings of the 22stInternational Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation,...
    Alex Orailoglu, Marc Reichenbach, Matthias Jung in Lecture Notes in Computer Science
    Conference proceedings 2022
  8. The current state and future of mobile security in the light of the recent mobile security threat reports

    Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In...

    Ahmet Cevahir Cinar, Turkan Beyza Kara in Multimedia Tools and Applications
    Article 30 January 2023
  9. Embedded fuzzing: a review of challenges, tools, and solutions

    Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software...

    Max Eisele, Marcello Maugeri, ... Giampaolo Bella in Cybersecurity
    Article Open access 02 September 2022
  10. Rest security framework for event streaming bus architecture

    Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...

    Jaimandeep Singh, Naveen Kumar Chaudhary in International Journal of Information Technology
    Article 13 April 2024
  11. A Permissioned Blockchain Approach for Real-Time Embedded Control Systems

    In real-time embedded control (RTEC) systems, sensors collect data which is processed and sent to different control nodes. RTEC deployments have...
    Pronaya Bhattacharya, Sudip Chatterjee, ... Pushan Kumar Dutta in Mining Intelligence and Knowledge Exploration
    Conference paper 2023
  12. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns

    Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches...

    Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras in International Journal of Information Security
    Article 29 January 2024
  13. Automating integration under emergent constraints for embedded systems

    As embedded applications are subject to non-functional requirements (latency, safety, reliability, etc.) they require special care when it comes to...

    Johannes Schlatow, Edgard Schmidt, Rolf Ernst in SICS Software-Intensive Cyber-Physical Systems
    Article Open access 23 October 2021
  14. Ontology-based security modeling in ArchiMate

    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...

    Ítalo Oliveira, Tiago Prince Sales, ... Giancarlo Guizzardi in Software and Systems Modeling
    Article Open access 16 February 2024
  15. Dynamic stochastic game-based security of edge computing based on blockchain

    As a rising technology in recent years, edge computing has the characteristics of low latency and low energy consumption, which makes it possible for...

    Haoyu Wang, Jianwei An in The Journal of Supercomputing
    Article 21 April 2023
  16. Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework

    In the field of medical image content protection and security sharing, the introduction of blockchain technology has a problem in that the secret key...

    Wenying Wen, Yunpeng Jian, ... Baolin Qiu in Multimedia Systems
    Article 18 November 2022
  17. Security in IoT-enabled smart agriculture: architecture, security solutions and challenges

    Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product...

    Anusha Vangala, Ashok Kumar Das, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article 18 April 2022
  18. Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing

    Fuzz testing (fuzzing) is a well-established method for identifying security weaknesses in input-data processing applications. For the analysis of...
    Maximilian Beckmann, Jan Steffan in Computer Security. ESORICS 2022 International Workshops
    Conference paper 2023
  19. DICEguard: enhancing DICE security for IoT devices with periodic memory forensics

    The number of Internet-of-Things (IoT) devices has been increasing rapidly every year. Most of these devices have access to important personal data...

    Yusuf Yamak, Suleyman Tosun, Murat Aydos in The Journal of Supercomputing
    Article Open access 29 May 2024
  20. Embedded Intelligence for Safety and Security Machine Vision Applications

    Artificial intelligence (AI) has experienced a recent increase in use across a wide variety of domains, such as image processing for security...
    Panagiotis Lioupis, Aris Dadoukis, ... Mikel Larrañaga in Image Analysis and Processing. ICIAP 2022 Workshops
    Conference paper 2022
Did you find what you were looking for? Share feedback.