Academic literature on the topic 'Embedded system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Embedded system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Embedded system security"
Koopman, P. "Embedded system security." Computer 37, no. 7 (2004): 95–97. http://dx.doi.org/10.1109/mc.2004.52.
Full textAl_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.
Full textSavitha, A. C., Kumar KM Madhu, S. S. Niharika, M. S. Nisarga, and Ganapati Hegde Praghathi. "Comprehensive Security Issues in Embedded System Design." Journal of Scholastic Engineering Science and Management (JSESM), A Peer Reviewed Universities Refereed Multidisciplinary Research Journal 4, no. 5 (2025): 31–37. https://doi.org/10.5281/zenodo.15393065.
Full textMehul P. Barot, Ramesh T. Prajapati, Darshan P. Patel, Hitesh H. Wandra,. "Embedded Systems Based Intelligent Bank Locker Security System." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 1770–76. http://dx.doi.org/10.52783/tjjpt.v44.i5.2854.
Full textBhaskar. S et al.,, Bhaskar S. et al ,. "Impenetrable Security System Using Embedded Softwares." International Journal of Electronics, Communication & Instrumentation Engineering Research and Development 9, no. 2 (2019): 17–24. http://dx.doi.org/10.24247/ijecierddec20193.
Full textMurphy, N. "Sleight of hand [embedded system security]." Electronics Systems and Software 2, no. 5 (2004): 32–35. http://dx.doi.org/10.1049/ess:20040505.
Full textSelokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.
Full textPradip, Ram Selokar, and T. Karule P. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867–73. https://doi.org/10.11591/ijece.v7i4.pp1867-1873.
Full textLokesh, P. "Embedded system-based enhanced smart security systems for intelligent monitoring applications: A review." i-manager’s Journal on Embedded Systems 12, no. 1 (2023): 16. http://dx.doi.org/10.26634/jes.12.1.20369.
Full textWang, Xu Hui. "The Research on Embedded Real-Time System Security Issues in Mechanical Control." Advanced Materials Research 681 (April 2013): 65–71. http://dx.doi.org/10.4028/www.scientific.net/amr.681.65.
Full textDissertations / Theses on the topic "Embedded system security"
Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.
Full textRumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textJiang, Ke. "Security-Driven Design of Real-Time Embedded Systems." Doctoral thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-123016.
Full textAbrahamsson, David. "Security Enhanced Firmware Update Procedures in Embedded Systems." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16914.
Full textKvist, Johan. "Security and Control System for fluid in a tank." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1011.
Full textChu, Weilian. "Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121597.
Full textVaslin, Romain. "Hardware core for off-chip memory security management in embedded system." Lorient, 2008. http://www.theses.fr/2008LORIS119.
Full textDeshmukh, Pallavi Prafulla. "A Hands-on Modular Laboratory Environment to Foster Learning in Control System Security." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71755.
Full textLorden, Eric James. "A Secure Software Platform for Real-Time Embedded Systems." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/36301.
Full textSkoglund, Johan. "Security of IEEE 802.11b." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1656.
Full textBooks on the topic "Embedded system security"
Halak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.
Full textCui, Ang. Embedded System Security: A Software-based Approach. [publisher not identified], 2015.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Imbedidŭ poan unyŏng chʻeje kisul kaebal =: Embedded secure operating system technology development. Chisik Kyŏngjebu, 2008.
Find full textInternational Association for Cryptologic Research. Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003. Proceedings. Springer Berlin Heidelberg, 2003.
Find full textCHES 2010 (2010 Santa Barbara, Calif.). Cryptographic hardware and embedded systems-- CHES 2010: 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings. Springer, 2010.
Find full textPande, Amit, and Joseph Zambreno. Embedded Multimedia Security Systems. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4459-5.
Full textRan, Giladi, Serpanos Dimitrios Nikolaou, and NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece), eds. Security and embedded systems. IOS Press, 2006.
Find full textHou, Xiaolu, and Jakub Breier. Cryptography and Embedded Systems Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62205-2.
Full textPande, Amit. Embedded Multimedia Security Systems: Algorithms and Architectures. Springer London, 2013.
Find full textBook chapters on the topic "Embedded system security"
Marwedel, Peter. "Embedded System Hardware." In Embedded Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_3.
Full textGebotys, Catherine H. "Side Channel Attacks on the Embedded System." In Security in Embedded Devices. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1530-6_8.
Full textFovino, Igor Nai. "SCADA System Cyber Security." In Secure Smart Embedded Devices, Platforms and Applications. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_20.
Full textLi, Letitia W., Florian Lugou, and Ludovic Apvrille. "Security Modeling for Embedded System Design." In Graphical Models for Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74860-3_7.
Full textWoo, Lai Leng, Mark Zwolinski, and Basel Halak. "Anomaly Detection in an Embedded System." In Hardware Supply Chain Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62707-2_6.
Full textChakravarty, Saptarshi, Aman Srivastava, Amrita Biswas, Kathyaini Rao, and Gargee Phukan. "Embedded Automobile Based Vehicular Security System." In Advances in Communication, Devices and Networking. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4932-8_40.
Full textHabibi, Javid, Ajay Panicker, Aditi Gupta, and Elisa Bertino. "DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_8.
Full textJingjing, Ma. "Analysis of Embedded Real-Time System Security." In Advances in Computer Science, Environment, Ecoinformatics, and Education. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23324-1_69.
Full textGonzález González, Oscar Arturo, Alina Mariana Pérez Soberanes, Víctor Hugo García Ortega, and Julio César Sosa Savedra. "Embedded Human Detection System for Home Security." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62554-2_4.
Full textLim, Jae-Deok, Sung-Kyong Un, Jeong-Nyeo Kim, and ChoelHoon Lee. "Implementation of LSM-Based RBAC Module for Embedded System." In Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_7.
Full textConference papers on the topic "Embedded system security"
Diwaker, Sanjai K., Pawan Kumar Chaurasia, and Mazhar Khaliq. "Pathways for Security of Embedded System: Issues and Challenges." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877516.
Full textPun, Kwok Ho, Yiu Sang Moon, Chi Chiu Tsang, Chun Tak Chow, and Siu Man Chan. "A face recognition embedded system." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.603566.
Full textQingyu, Ou, Luo Fang, and Huang Kai. "High-Security System Primitive for Embedded Systems." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.48.
Full textLi, Gen, Jianmin Zhang, Minghua Niu, and Yong Li. "Warehouse Security System based on Embedded System." In International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015). Atlantis Press, 2015. http://dx.doi.org/10.2991/lemcs-15.2015.245.
Full textZhao, Guangyuan, Zhiwei Wang, Wei Li, and Ke Wang. "An Embedded Laboratory Security Monitoring System." In 2011 International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2011. http://dx.doi.org/10.1109/icmtma.2011.100.
Full textLouk, Maya, Hyotaek Lim, and Hoon Jae Lee. "Security System in Cloud Computing for Medical Data Usage." In Embedded Ubiquitous 2013. Science & Engineering Research Support soCiety, 2013. http://dx.doi.org/10.14257/astl.2013.38.06.
Full textXie, WeiHua, Jie Tian, Xin Yang, Hong Chen, Yuliang He, and TangHui Zhang. "Embedded fingerprint identification system based on DSP." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.603234.
Full textFalk, Heiko. "Session details: Security in memory." In ESWEEK'12: Eighth Embedded System Week. ACM, 2012. http://dx.doi.org/10.1145/3250258.
Full textGogniat, G., T. Wolf, and W. Burleson. "Reconfigurable Security Primitive for Embedded Systems." In 2005 International Symposium on System-on-Chip. IEEE, 2005. http://dx.doi.org/10.1109/issoc.2005.1595635.
Full textBaxter, Christopher R., Todd R. Cicchi, Mark A. Massie, and Paul L. McCarley. "Miniature embedded real-time image processor system for smart sensor systems." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.548406.
Full textReports on the topic "Embedded system security"
Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Full textGanger, Gregory R., and David F. Nagle. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada396954.
Full textReinhart, Tod, Carolyn Boettcher, G. A. Gandara, and Mark Hama. Defining a Security Architecture for Real-Time Embedded Systems. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada465687.
Full textSonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.
Full textShah, Tavseef Mairaj, Olivia Riemer, Nadia El-Hage Scialabba, and Alexander Müller. The Agri-Food Systems Transformation Protocol: Mapping the Agents and Drivers of Transformation. TMG Research gGmbH, 2023. http://dx.doi.org/10.35435/1.2023.4.
Full text