We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Cloud data security for distributed embedded systems using machine learning and cryptography

    In the growing demand for distributed embedded systems that efficiently execute complex processes and high-end applications, safeguarding sensitive...

    Sadaf Bashir, Zahrah Ayub, M. Tariq Banday in International Journal of Information Technology
    Article 07 May 2024
  2. A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

    IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber...

    Shahid Ul Haq, Yashwant Singh, ... Dipak Gupta in Discover Internet of Things
    Article Open access 31 October 2023
  3. Unboxing fog security: a review of fog security and authentication mechanisms

    Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible...

    Neha Kaliya, Digambar Pawar in Computing
    Article 15 August 2023
  4. Lightweight micro-architecture for IoT & FPGA security

    Cryptographic standards were created with the goal of being able to work on a wide range of systems. Small computing systems with limited capacity to...

    Rajdeep Chakraborty, Uttam Kr. Mondal, ... Bibek Bikash Roy in International Journal of Information Technology
    Article 05 September 2023
  5. A novel trusted hardware-based scalable security framework for IoT edge devices

    The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT...

    Mohd Khan, Mohsen Hatami, ... Yu Chen in Discover Internet of Things
    Article Open access 27 April 2024
  6. Intelligent detection for sustainable agriculture: A review of IoT-based embedded systems, cloud platforms, DL, and ML for plant disease detection

    Plant diseases pose a significant threat to the sustainability of the environment and global food security. With an increasing population density and...

    Abdennabi Morchid, Marouane Marhoun, ... Bensalem Boukili in Multimedia Tools and Applications
    Article 06 February 2024
  7. A Haskell-Embedded DSL for Secure Information-Flow

    This paper presents a domain specific language, embedded in Haskell (EDSL), for enforcing the information flow policy Delimited Release. To build...
    Cecilia Manzino, Gonzalo de Latorre in Formal Methods: Foundations and Applications
    Conference paper 2024
  8. SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software

    Develo** embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms...

    Miltiadis Siavvas, Dimitrios Tsoukalas, ... Dimitrios Tzovaras in Automated Software Engineering
    Article 11 June 2024
  9. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  10. Embedded 3D reconstruction of dynamic objects in real time for maritime situational awareness pictures

    Assessing the security status of maritime infrastructures is a key factor for maritime safety and security. Facilities such as ports and harbors are...

    Felix Sattler, Borja Carrillo-Perez, ... Gregor Lux in The Visual Computer
    Article Open access 10 March 2023
  11. Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework

    In the field of medical image content protection and security sharing, the introduction of blockchain technology has a problem in that the secret key...

    Wenying Wen, Yunpeng Jian, ... Baolin Qiu in Multimedia Systems
    Article 18 November 2022
  12. Security enhanced random grid visual cryptography scheme using master share and embedding method

    Visual cryptography scheme is one of the main branches of secret sharing. The image is converted into various shares and then recouped by overlap**...

    Neetha Francis, Thomas Monoth in International Journal of Information Technology
    Article 17 August 2023
  13. Winternitz stack protocols for embedded systems and IoT

    This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an  oracle. Mutually...

    Alex Shafarenko in Cybersecurity
    Article Open access 04 April 2024
  14. Ontology-based security modeling in ArchiMate

    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...

    Ítalo Oliveira, Tiago Prince Sales, ... Giancarlo Guizzardi in Software and Systems Modeling
    Article Open access 16 February 2024
  15. The current state and future of mobile security in the light of the recent mobile security threat reports

    Smartphones have become small computers that meet many of our needs, from e-mail and banking transactions to communication and social media use. In...

    Ahmet Cevahir Cinar, Turkan Beyza Kara in Multimedia Tools and Applications
    Article 30 January 2023
  16. Rest security framework for event streaming bus architecture

    Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...

    Jaimandeep Singh, Naveen Kumar Chaudhary in International Journal of Information Technology
    Article 13 April 2024
  17. Effect of Data Sampling on Cone Shaped Embedded Normalization in Just in Time Software Defect Prediction

    Just-in-Time (JIT) defect prediction represents a software engineering approach that seeks to detect potential defects in software code at the...

    Lipika Goel, Sonam Gupta, ... Vinay Pathak in SN Computer Science
    Article 27 March 2024
  18. Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography

    This study investigates the innovative application of Direct Sequence Spread Spectrum (DSSS) technology in the realm of image steganography, known as...

    Oleksandr Kuznetsov, Emanuele Frontoni, Kyrylo Chernov in Applied Intelligence
    Article 17 April 2024
  19. TSEE: a novel knowledge embedding framework for cyberspace security

    Knowledge representation models have been extensively studied and they provide an important foundation for artificial intelligence. However, the...

    Angxiao Zhao, Zhaoquan Gu, ... Yanchun Zhang in World Wide Web
    Article 01 November 2023
  20. On the Security of Smart Home Systems: A Survey

    Among the plethora of IoT (Internet of Things) applications, the smart home is one of the fastest-growing. However, the rapid development of the...

    Bin Yuan, Jun Wan, ... Hai ** in Journal of Computer Science and Technology
    Article 30 March 2023
Did you find what you were looking for? Share feedback.