[HTML][HTML] A methodology for security classification applied to smart grid infrastructures
The electricity grid is an important critical infrastructure that is undergoing major changes,
due to the Internet of Things (IoT) and renewable energy, heading towards the smart grid …
due to the Internet of Things (IoT) and renewable energy, heading towards the smart grid …
Analytical review of cybersecurity for embedded systems
To identify the key factors and create the landscape of cybersecurity for embedded systems
(CSES), an analytical review of the existing research on CSES has been conducted. The …
(CSES), an analytical review of the existing research on CSES has been conducted. The …
Assessing security of software components for Internet of Things: a systematic review and future directions
Software component plays a significant role in the functionality of software systems.
Component of software is the existing and reusable parts of a software system that is …
Component of software is the existing and reusable parts of a software system that is …
Bridging the digital divide: Challenges in opening the digital world to the elderly, poor, and digitally illiterate
A dvanced technological innovations and the Internet appear to be available everywhere.
However, a large section of society is still on the wrong side of the digital divide, unable to …
However, a large section of society is still on the wrong side of the digital divide, unable to …
An efficient and secure automotive wireless software update framework
M Steger, CA Boano, T Niedermayr… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Future vehicles will be wirelessly connected to nearby vehicles, to the road infrastructure,
and to the Internet, thereby becoming an integral part of the Internet of Things. New comfort …
and to the Internet, thereby becoming an integral part of the Internet of Things. New comfort …
A security design for the detecting of buffer overflow attacks in IoT device
B Xu, W Wang, Q Hao, Z Zhang, P Du, T Xia, H Li… - IEEE …, 2018 - ieeexplore.ieee.org
At present, the IoT devices face many kinds of software and hardware attacks, especially
buffer overflow attacks. This paper presents an architectural-enhanced security hardware …
buffer overflow attacks. This paper presents an architectural-enhanced security hardware …
[PDF][PDF] 物联网操作系统安全研究综述
彭安妮, 周威, 贾岩, 张玉清 - Journal on Communication …, 2018 - infocomm-journal.com
随着物联网的迅速普及和应用, 物联网系统核心(操作系统) 的安全问题越发显得急迫和突出.
首先, 对现阶段市场上广泛应用的物联网操作系统及其特征进行了介绍, 分析了其与传统嵌入式 …
首先, 对现阶段市场上广泛应用的物联网操作系统及其特征进行了介绍, 分析了其与传统嵌入式 …
Security, privacy, and dependability evaluation in verification and validation life cycles for military IoT systems
M Pradhan, J Noll - IEEE Communications Magazine, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a disruptive technology that complements the usage of
modern day information and communications technology (ICT) systems. IoT systems, with …
modern day information and communications technology (ICT) systems. IoT systems, with …
Intelligent control of urban lighting system based on video image processing technology
Q Yun, C Leng - Ieee Access, 2020 - ieeexplore.ieee.org
The rapid iterative development of information technology, computer technology and Internet
of things technology promotes the construction of smart city, and the related concepts of …
of things technology promotes the construction of smart city, and the related concepts of …
Generic framework enabling secure and efficient automotive wireless SW updates
M Steger, M Karner, J Hillebrand… - 2016 IEEE 21st …, 2016 - ieeexplore.ieee.org
Future vehicles will be wirelessly connected to nearby vehicles, to the road infrastructure
and to the Internet in order to enable new comfort features, safety functions and a number of …
and to the Internet in order to enable new comfort features, safety functions and a number of …