Search
Search Results
-
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks
The Internet of Things (IoT) has shown incredible adaptability in recent years and has become an integral part of human life. The proliferation of...
-
A middleware for providing communicability to Embedded MAS based on the lack of connectivity
An Embedded multi-agent system (Embedded MAS) is an embedded cognitive system based on agents cooperating to control hardware devices. These agents...
-
CIA Security for Internet of Vehicles and Blockchain-AI Integration
The lack of data security and the hazardous nature of the Internet of Vehicles (IoV), in the absence of networking settings, have prevented the...
-
A quantitative analysis of the security of PoW-based blockchains
This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...
-
The Next Big Thing: From Embedded Systems to Embodied Actors
Traditional engineering is coming to a junction from embedded systems to embodied actors, and with assuring the beneficial and robust behavior of... -
Embedded 3D reconstruction of dynamic objects in real time for maritime situational awareness pictures
Assessing the security status of maritime infrastructures is a key factor for maritime safety and security. Facilities such as ports and harbors are...
-
Embedded Computer Systems: Architectures, Modeling, and Simulation 22nd International Conference, SAMOS 2022, Samos, Greece, July 3–7, 2022, Proceedings
This book constitutes the proceedings of the 22stInternational Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation,... -
The current state and future of mobile security in the light of the recent mobile security threat reports
Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In...
-
Embedded fuzzing: a review of challenges, tools, and solutions
Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software...
-
Rest security framework for event streaming bus architecture
Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...
-
A Permissioned Blockchain Approach for Real-Time Embedded Control Systems
In real-time embedded control (RTEC) systems, sensors collect data which is processed and sent to different control nodes. RTEC deployments have... -
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches...
-
Automating integration under emergent constraints for embedded systems
As embedded applications are subject to non-functional requirements (latency, safety, reliability, etc.) they require special care when it comes to...
-
Ontology-based security modeling in ArchiMate
Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...
-
Dynamic stochastic game-based security of edge computing based on blockchain
As a rising technology in recent years, edge computing has the characteristics of low latency and low energy consumption, which makes it possible for...
-
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework
In the field of medical image content protection and security sharing, the introduction of blockchain technology has a problem in that the secret key...
-
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product...
-
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing
Fuzz testing (fuzzing) is a well-established method for identifying security weaknesses in input-data processing applications. For the analysis of... -
DICEguard: enhancing DICE security for IoT devices with periodic memory forensics
The number of Internet-of-Things (IoT) devices has been increasing rapidly every year. Most of these devices have access to important personal data...
-
Embedded Intelligence for Safety and Security Machine Vision Applications
Artificial intelligence (AI) has experienced a recent increase in use across a wide variety of domains, such as image processing for security...