Výsledky vyhľadávania - "Embedded Systems Security"
-
1
Autori: a ďalší
Zdroj: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing. :1560-1569
-
2
Autori:
Zdroj: Proceedings of the 2024 7th International Conference on Information Science and Systems. :163-169
-
3
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: TRITA-EECS-AVL.
Predmety: FPGA security, embedded systems security, cloud security, physically unclonable functions, side-channel attacks, covert-channel attacks, neural network fingerprinting, FPGA-säkerhet, säkerhet i inbyggda system, molnsäkerhet, fysiskt icke-klonbara funktioner (PUF), sidokanalattacker, dolda kanalattacker, fingeravtrycksbestämning av neurala nätverk, FPGA güvenliği, gömülü sistemler güvenliği, bulut güvenliği, fiziksel klonlanamayan fonksiyonlar (PUF), yan kanal saldırıları, gizli kanal saldırıları, sinir ağı parmak izi tespiti, Informations- och kommunikationsteknik, Information and Communication Technology
Popis súboru: electronic
-
4
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Network Security, Autonomous Systems Security, Space Cybersecurity, Cyber-Physical Systems, System Security, Post-Quantum Cryptography, Satellite Security, ddc:004, Embedded Systems Security
Popis súboru: application/pdf
Prístupová URL adresa: https://drops.dagstuhl.de/entities/document/10.4230/DagRep.15.3.1
-
5
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Computer Security, Embedded Systems Security, Side-Channel Attacks, Automated Countermeasure Instantiation
Popis súboru: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-032-00623-3; info:eu-repo/semantics/altIdentifier/isbn/978-3-032-00624-0; ispartofbook:Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, Ghent, Belgium, August 11-14, 2025; 20th International Conference on Availability, Reliability and Security, ARES 2025; volume:15992; firstpage:301; lastpage:321; numberofpages:21; serie:LECTURE NOTES IN COMPUTER SCIENCE; alleditors:M. Dalla Preda, S. Schrittwieser, V. Naessens, B. De Sutter; https://hdl.handle.net/11311/1292567
-
6
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: IoT Security, Cryptography, Side channel attacks, Embedded systems security, Applied cryptography
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89062-8; info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89065-9; info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89063-5; ispartofbook:The 22nd International Conference on Information Technology-New Generations (ITNG 2025); 22nd International Conference on Information Technology-New Generations (ITNG 2025); volume:1463; firstpage:71; lastpage:83; numberofpages:13; serie:ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING; alleditors:Shahram Latifi; https://hdl.handle.net/11311/1289747
-
7
Autori: a ďalší
Zdroj: 2023 IEEE International Conference on Cyber Security and Resilience (CSR). :99-104
Predmety: IoT, embedded systems, security, safety
Popis súboru: application/pdf
-
8
Autori:
Predmety: Vehicle Immobilization, Digital Forensics, Automotive Cybersecurity, Anti-theft systems, Electromagnetic Interference, Remote vehicle access, Kinetic compliance, Counter-Surveillance, Signal Jamming, SIGINT, Unauthorized Access Prevention, Recursive Deterrence, Embedded Systems Security, Forensic Policy, Critical Infrastructure Protection, CENTEL, Centel Intelligence Adjacency
Relation: https://zenodo.org/communities/centel-adjacency/; https://zenodo.org/records/16238988; oai:zenodo.org:16238988; https://doi.org/10.5281/zenodo.16238988
-
9
Autori: a ďalší
Zdroj: ISSN:1539-9087 ; ISSN:1558-3465 ; ACM Transactions on Embedded Computing Systems, vol. 24 (5), Art.No. 70.
Predmety: Science & Technology, Technology, Computer Science, Hardware & Architecture, Software Engineering, Threat modeling, embedded systems security, hardware security, DIFFERENTIAL POWER ANALYSIS, ATTACKS, 0803 Computer Software, 0805 Distributed Computing, 1006 Computer Hardware, Computer Hardware & Architecture, 4006 Communications engineering, 4606 Distributed computing and systems software
Popis súboru: application/pdf
Relation: info:eu-repo/grantAgreement/EC/H2020/101020005; info:eu-repo/grantAgreement/EC/HE/101070008; https://lirias.kuleuven.be/handle/20.500.12942/754414; https://doi.org/10.1145/3698396
-
10
Autori: Arkannezhad, Fatemeh
Predmety: Computer engineering, Computer science, Electrical engineering, Embedded Systems Security, Hardware-Software Co-design, Secure data sharing, Secure I/O, Secure sensors and actuators, Trusted Execution Environment (TEE)
Prístupová URL adresa: https://escholarship.org/uc/item/9g20b1vg
-
11
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: https://inria.hal.science/hal-05024950 ; 2025.
Predmety: Cryptography and Security (cs.CR), Embedded systems security, Hardware security, Multi-channel attacks, Screaming-channel attacks, EM side-channel attacks, Side-channel attacks, FOS: Computer and information sciences, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2504.02979; ARXIV: 2504.02979
-
12
Autori: a ďalší
Zdroj: IEEE Access, Vol 9, Pp 156507-156527 (2021)
Predmety: Correlation Power Analysis, side channel attack countermeasures, Side Channel Attack Countermeasures, Side-channel attacks, 02 engineering and technology, microarchitectural reverse engineering, Embedded Systems Security, TK1-9971, Microarchitectural Reverse Engineering, Computer security, correlation power analysis, Cryptography, 0202 electrical engineering, electronic engineering, information engineering, Electrical engineering. Electronics. Nuclear engineering, Microarchitecture, embedded systems security, Computer Security
Popis súboru: application/pdf
Prístupová URL adresa: https://doaj.org/article/fee43eca6be34d29960fc9fe0bfc104f
http://xplorestaging.ieee.org/ielx7/6287639/6514899/09598930.pdf?arnumber=9598930
https://hdl.handle.net/11311/1191836
https://doi.org/10.1109/ACCESS.2021.3124761
https://ieeexplore.ieee.org/document/9598930?source=authoralert -
13
Autori: a ďalší
Zdroj: IEEE Embedded Systems Letters.
Predmety: Cyber-physical Systems, Co-design, Embedded Systems Security, Safety Critical Systems, Electrical Engineering, Elektro- och systemteknik
Popis súboru: electronic
-
14
Autori:
Zdroj: Ibrahim, O A, Sciancalepore, S & Di Pietro, R 2024, 'MAG-PUFs : Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning', Computers and Security, vol. 143, 103905. https://doi.org/10.1016/j.cose.2024.103905
Predmety: Covert channels, Embedded systems security, Physical-layer authentication, Unintentional electromagnetic emissions
Popis súboru: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/pissn/0167-4048
-
15
Autori:
Zdroj: IEEE Access, Vol 9, Pp 142390-142410 (2021)
Predmety: 0202 electrical engineering, electronic engineering, information engineering, fileless malware, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, embedded systems security, Remote attestation, TK1-9971
-
16
Autori: davide zoni
Zdroj: 2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)
Predmety: Embedded Systems Security, Side Channel Attacks, Hardware Design Flow, Applied Cryptography, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Popis súboru: application/pdf
Prístupová URL adresa: https://re.public.polimi.it/retrieve/handle/11311/1091953/382369/ReCoSoC_2019_invited.pdf
https://ieeexplore.ieee.org/document/9034935
https://dblp.uni-trier.de/db/conf/recosoc/recosoc2019.html#Zoni19
https://re.public.polimi.it/handle/11311/1091953
https://ieeexplore.ieee.org/document/9034935
https://doi.org/10.1109/ReCoSoC48741.2019.9034935
https://hdl.handle.net/11311/1091953 -
17
Autori: a ďalší
Zdroj: IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
Predmety: Embedded Systems Security, Side Channel Attacks, Profiled Attacks, Template Attacks, PUF, Applied Cryptography, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Popis súboru: application/pdf
Prístupová URL adresa: https://re.public.polimi.it/bitstream/11311/1092738/1/SCRAMBLE%20TCAD%202019.pdf
https://ieeexplore.ieee.org/document/8755310/
https://re.public.polimi.it/bitstream/11311/1092738/1/SCRAMBLE%20TCAD%202019.pdf
https://re.public.polimi.it/handle/11311/1092738
https://dblp.uni-trier.de/db/journals/tcad/tcad39.html#BarenghiFPZ20
https://ieeexplore.ieee.org/document/8755310
https://hdl.handle.net/11311/1092738
https://doi.org/10.1109/TCAD.2019.2926389 -
18
Autori: Jakkamsetti, Sashidhar
Predmety: Computer science, Computer engineering, Control-flow attacks, Embedded Systems Security, Formal Verification, IoT, Privacy, Remote Attestation
Popis súboru: application/pdf
-
19
Autori: a ďalší
Zdroj: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. :343-345
Predmety: multiple observations, 0202 electrical engineering, electronic engineering, information engineering, internet-of-things, physically unclonable function, 02 engineering and technology, embedded systems security, end-to-end encryption
Prístupová URL adresa: https://research.tue.nl/en/publications/3d7b1e92-d5f6-42d5-980a-fda32d444705
https://doi.org/10.1145/3395351.3401793
https://www.narcis.nl/publication/RecordID/oai%3Apure.tue.nl%3Apublications%2F3d7b1e92-d5f6-42d5-980a-fda32d444705
https://research.tue.nl/nl/publications/rescure-retrofit-security -for-critical-infrastructures-demonstrat -
20
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: ACM Transactions on Embedded Computing Systems. 18:1-22
Predmety: 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, Computer science and engineering [Engineering], Security and Privacy, 02 engineering and technology, Embedded Systems Security
Popis súboru: application/pdf
Prístupová URL adresa: https://dr.ntu.edu.sg/bitstream/10356/144668/2/Combining%20PUF%20with%20RLUTs%20a%20two%20party%20pay%20per%20device%20IP%20licensing%20scheme%20on%20FPGAs.pdf
https://dblp.uni-trier.de/db/journals/tecs/tecs18.html#RoyBNM19
https://dl.acm.org/doi/10.1145/3301307
https://doi.org/10.1145/3301307
https://hdl.handle.net/10356/144668
Nájsť tento článok vo Web of Science
Full Text Finder