[图书][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things
P Marwedel - 2021 - library.oapen.org
… This chapter presents terms used in the context of embedded systems together with their
history as well as opportunities, challenges, and common characteristics of embedded and …
history as well as opportunities, challenges, and common characteristics of embedded and …
[HTML][HTML] Hardware security of fog end-devices for the internet of things
… in introducing hardware security measures for FCGs. This section summarizes all possible
hardware security measures that can be considered for the FCGs, while deciding security …
hardware security measures that can be considered for the FCGs, while deciding security …
Security considerations for Internet of Things: A survey
… [5] surveyed IoT frameworks on the emphasis of security and privacy. This paper clarifies
the proposed architecture, and hardware sepcand points out the security features for 8 IoT …
the proposed architecture, and hardware sepcand points out the security features for 8 IoT …
Hardware security in IoT era: The role of measurements and instrumentation
… In this paper, a brief literature survey regarding the research pointing out the Hardware
Security (HS) for IoT is presented. Furthermore, in the paper, a short analysis regarding the …
Security (HS) for IoT is presented. Furthermore, in the paper, a short analysis regarding the …
[HTML][HTML] Security trends in Internet of Things: A survey
… The Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable
and have embedded … The purpose of this study is to explore discrete IoT security challenges …
and have embedded … The purpose of this study is to explore discrete IoT security challenges …
Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems
… embedded IoT devices and fuzzing. For this end, we list the particularities of the embedded
world as far as security … , studying their applicability to embedded IoT devices and, finally, we …
world as far as security … , studying their applicability to embedded IoT devices and, finally, we …
Security and privacy requirements for the internet of things: A survey
… Security has been integrated while designing and implementing the system. The main
idea is to embed security … ACM Transactions on Internet of Things, Vol. 2, No. 1, Article 6. …
idea is to embed security … ACM Transactions on Internet of Things, Vol. 2, No. 1, Article 6. …
[HTML][HTML] Internet of things: Security and solutions survey
… hardware-level attacks are prominent scope for attackers. To build complete secure hardware,
secure Integrated … -scale design, distribution of embedded Very Large Scale Integration (…
secure Integrated … -scale design, distribution of embedded Very Large Scale Integration (…
[HTML][HTML] Edge computing: A survey on the hardware requirements in the internet of things world
… This section introduces the main hardware components that compose a typical IoT node,
or more in general, a typical electronic system. Taking into account the power and energy …
or more in general, a typical electronic system. Taking into account the power and energy …
Internet of Things: Evolution and technologies from a security perspective
… own gain, referred to as cyber security attacks. By creating an introduction to IoT, this paper
seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. …
seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. …