We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Cloud data security for distributed embedded systems using machine learning and cryptography

    In the growing demand for distributed embedded systems that efficiently execute complex processes and high-end applications, safeguarding sensitive...

    Sadaf Bashir, Zahrah Ayub, M. Tariq Banday in International Journal of Information Technology
    Article 07 May 2024
  2. A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

    IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber...

    Shahid Ul Haq, Yashwant Singh, ... Dipak Gupta in Discover Internet of Things
    Article Open access 31 October 2023
  3. Speech emotion recognition systems and their security aspects

    Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...

    Itzik Gurowiec, Nir Nissim in Artificial Intelligence Review
    Article Open access 21 May 2024
  4. On the Security of Smart Home Systems: A Survey

    Among the plethora of IoT (Internet of Things) applications, the smart home is one of the fastest-growing. However, the rapid development of the...

    Bin Yuan, Jun Wan, ... Hai ** in Journal of Computer Science and Technology
    Article 30 March 2023
  5. Intelligent detection for sustainable agriculture: A review of IoT-based embedded systems, cloud platforms, DL, and ML for plant disease detection

    Plant diseases pose a significant threat to the sustainability of the environment and global food security. With an increasing population density and...

    Abdennabi Morchid, Marouane Marhoun, ... Bensalem Boukili in Multimedia Tools and Applications
    Article 06 February 2024
  6. Embedded Systems: Rules to Improve Adaptability

    Embedded systems have specific properties, which are consequences of the application domain, namely the close connection to the underlying technical...
    Manfred Nagl in Software Architectures
    Chapter 2024
  7. Winternitz stack protocols for embedded systems and IoT

    This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an  oracle. Mutually...

    Alex Shafarenko in Cybersecurity
    Article Open access 04 April 2024
  8. Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures

    Upcoming technological innovations and findings are immense in the field of intelligent transport systems (ITS). Cyber-physical systems (CPSs) are...

    R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar in SN Computer Science
    Article 29 July 2023
  9. Embedded decision support platform based on multi-agent systems

    There has been an outstanding use of memory storage of processors as current applications: Artificial Intelligence-based applications,...

    Tarek Frikha, Faten Chaabane, ... Habib Hamam in Multimedia Tools and Applications
    Article 01 March 2023
  10. Efficient memory reuse methodology for CNN-based real-time image processing in mobile-embedded systems

    Real-time image processing applications such as intelligent security and traffic management requires pattern recognition tasks, such face...

    Kairong Zhao, Yinghui Chang, ... Donghui Guo in Journal of Real-Time Image Processing
    Article 21 October 2023
  11. Embedded Ethics for Responsible Artificial Intelligence Systems (EE-RAIS) in disaster management: a conceptual model and its deployment

    In this paper, we argue that Responsible Artificial Intelligence Systems (RAIS) require a shift toward embedded ethics to address value-based...

    Saleh Afroogh, Ali Mostafavi, ... Kambiz Rasoulkhani in AI and Ethics
    Article 20 June 2023
  12. Who is controlling whom? Reframing “meaningful human control” of AI systems in security

    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited...

    Markus Christen, Thomas Burri, ... Pascal Vörös in Ethics and Information Technology
    Article Open access 10 February 2023
  13. Lightweight micro-architecture for IoT & FPGA security

    Cryptographic standards were created with the goal of being able to work on a wide range of systems. Small computing systems with limited capacity to...

    Rajdeep Chakraborty, Uttam Kr. Mondal, ... Bibek Bikash Roy in International Journal of Information Technology
    Article 05 September 2023
  14. SyMPLES: Embedded Systems Design with SMarty

    The evolution of hardware platforms has led to the move of a large amount of functionality to embedded software systems. Thus, the software has...
    Rogério F. da Silva, Alexandre A. Giron, Itana M. S. Gimenes in UML-Based Software Product Line Engineering with SMarty
    Chapter 2023
  15. Hel** novice developers harness security issues in cloud-IoT systems

    The development of cloud-connected Internet of Things (IoT) systems is becoming more and more affordable, even to novice programmers, thanks to...

    Fulvio Corno, Luigi De Russis, Luca Mannella in Journal of Reliable Intelligent Environments
    Article Open access 13 May 2022
  16. A Deep Learning Framework for Microarchitecture Independent Workload Characterization Technique for Multi-core Asymmetric Embedded Systems

    Embedded workloads are increasing day by day and becoming more complex. The number of workloads running in the embedded processors has been growing...

    R. Sivaramakrishnan, G. Senthilkumar in SN Computer Science
    Article 30 June 2023
  17. Exception Handling in Real-Time and Embedded Systems

    Modern computing not only demands precise execution but also timely and responsive actions. Nowhere is this truer than in the realm of real-time and...
    Pedro Mejia Alvarez, Raul E. Gonzalez Torres, Susana Ortega Cisneros in Exception Handling
    Chapter 2024
  18. Multiprocessing in Embedded Systems

    This chapter covers multiprocessing in embedded systems. It explains the requirements of Symmetric Multiprocessing (SMP) systems and compares the...
    Chapter 2023
  19. Decentralized and Autonomous Key Management for Open Multi-agent Systems of Embedded Agents

    This paper presents a public key infrastructure for open multi-agent systems of embedded agents. Open multi-agent systems of embedded agents are a...
    Arthur Baudet, Oum-El-Kheir Aktouf, ... Philippe Elbaz-Vincent in Cooperative Information Systems
    Conference paper 2024
  20. \(\mu \) IPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems

    Many embedded systems are low-cost bare-metal systems where the firmware executes directly on hardware without an OS. Bare-metal systems typically...
    Luca Degani, Majid Salehi, ... Bruno Crispo in Computer Security – ESORICS 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.