Journal articles on the topic 'Embedded system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Embedded system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Koopman, P. "Embedded system security." Computer 37, no. 7 (2004): 95–97. http://dx.doi.org/10.1109/mc.2004.52.
Full textAl_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.
Full textSavitha, A. C., Kumar KM Madhu, S. S. Niharika, M. S. Nisarga, and Ganapati Hegde Praghathi. "Comprehensive Security Issues in Embedded System Design." Journal of Scholastic Engineering Science and Management (JSESM), A Peer Reviewed Universities Refereed Multidisciplinary Research Journal 4, no. 5 (2025): 31–37. https://doi.org/10.5281/zenodo.15393065.
Full textMehul P. Barot, Ramesh T. Prajapati, Darshan P. Patel, Hitesh H. Wandra,. "Embedded Systems Based Intelligent Bank Locker Security System." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 1770–76. http://dx.doi.org/10.52783/tjjpt.v44.i5.2854.
Full textBhaskar. S et al.,, Bhaskar S. et al ,. "Impenetrable Security System Using Embedded Softwares." International Journal of Electronics, Communication & Instrumentation Engineering Research and Development 9, no. 2 (2019): 17–24. http://dx.doi.org/10.24247/ijecierddec20193.
Full textMurphy, N. "Sleight of hand [embedded system security]." Electronics Systems and Software 2, no. 5 (2004): 32–35. http://dx.doi.org/10.1049/ess:20040505.
Full textSelokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.
Full textPradip, Ram Selokar, and T. Karule P. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867–73. https://doi.org/10.11591/ijece.v7i4.pp1867-1873.
Full textLokesh, P. "Embedded system-based enhanced smart security systems for intelligent monitoring applications: A review." i-manager’s Journal on Embedded Systems 12, no. 1 (2023): 16. http://dx.doi.org/10.26634/jes.12.1.20369.
Full textWang, Xu Hui. "The Research on Embedded Real-Time System Security Issues in Mechanical Control." Advanced Materials Research 681 (April 2013): 65–71. http://dx.doi.org/10.4028/www.scientific.net/amr.681.65.
Full textNegi, Vivek, Himanshu Verma, Ipsita Singh, et al. "Network Security in Embedded System Using TLS." International Journal of Security and Its Applications 10, no. 2 (2016): 375–84. http://dx.doi.org/10.14257/ijsia.2016.10.2.33.
Full textFeng, A., M. Knieser, M. Rizkalla, B. King, P. Salama, and F. Bowen. "Embedded system for sensor communication and security." IET Information Security 6, no. 2 (2012): 111. http://dx.doi.org/10.1049/iet-ifs.2010.0073.
Full textDharanya, S. "Embedded Based 3G Security System for Prison." Indian Journal of Science and Technology 6, no. 5 (2013): 1–4. http://dx.doi.org/10.17485/ijst/2013/v6i5.17.
Full textGoyal, Sanket, Pranali Desai, and Vasanth Swaminathan. "Multi-Level Security Embedded With Surveillance System." IEEE Sensors Journal 17, no. 22 (2017): 7497–501. http://dx.doi.org/10.1109/jsen.2017.2756876.
Full textChen, Hong Li. "Research on Security Level Assessment Technology in Embedded Real-Time System." Applied Mechanics and Materials 696 (November 2014): 266–70. http://dx.doi.org/10.4028/www.scientific.net/amm.696.266.
Full textShilpa and Kirti Jain. "Security Features in Fingerprint Biometric System." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 9–18. https://doi.org/10.5281/zenodo.10641797.
Full textXie, Yu, and Attila Buchman. "A survey for Communication security of the embedded system." Carpathian Journal of Electronic and Computer Engineering 14, no. 2 (2021): 15–19. http://dx.doi.org/10.2478/cjece-2021-0009.
Full textWin, Win Maw, and San Lwin San. "Text Embedded System using LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1818–22. https://doi.org/10.5281/zenodo.3591533.
Full textOdirichukwu, J.C. "Embedded Phone Call Based Burglary Security Alert System." Journal of Embedded Systems and Processing 4, no. 1 (2019): 24–30. https://doi.org/10.5281/zenodo.2622387.
Full textEshwarappa Dandur, Veeresh, and Ning Weng. "Networked Embedded System Security: Technologies, Analysis and Implementation." Recent Advances in Communications and Networking Technology 5, no. 2 (2017): 90–107. http://dx.doi.org/10.2174/2215081106666161227160759.
Full textNiu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.
Full textYunsi, Fei,, Eisenbarth, Thomas, and Serpanos, Dimitrios. "Guest Editorial: Special Section on Embedded System Security." IEEE Embedded Systems Letters 7, no. 1 (2015): 1–2. http://dx.doi.org/10.1109/les.2015.2404940.
Full textDhule, Prashant1 Prof R.P.Chaudhari2. "EMBEDDED BASED SECURITY SYSTEM USING GSM AND RFID." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 1 (2017): 245–49. https://doi.org/10.5281/zenodo.246645.
Full textLi, Jing, Huan Guo Zhang, Bo Zhao, Xi Guo, and Fan He. "Research on Hardware Security of Embedded System in Cloud Environment." Advanced Materials Research 488-489 (March 2012): 1480–87. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1480.
Full textD, Mr Deepak. "Analyzing Embedded System Security: Exploiting Weaknesses and Implementing Robust Defenses." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 660–64. https://doi.org/10.22214/ijraset.2025.67347.
Full textBommanahal, Ramagiri Mata Thrigunyeshwari, Kiran Deepa, Pabhu Pooja, S. Rakshitha, and Resna SR Mrs Sandhya Rai Mrs. "Smart Security System." International Journal for Research Trends and Innovation 7, no. 7 (2022): 1711–16. https://doi.org/10.5281/zenodo.11352753.
Full textAung, Myint Aye. "LSB Based Image Steganography for Information Security System." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 394–400. https://doi.org/10.31142/ijtsrd18995.
Full textDr. N. Kala and Premanand Narasimhan. "Secure by Design: Proactive Approaches to Embedded System Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1009–35. https://doi.org/10.32628/cseit241061147.
Full textGopadi, Mr Harish Kumar, E Samanvitha, G Deepthi, and G sahithi. "VEHICLE ANTI-THEFT SECURITY SYSTEM WITH IGNITION LOCKING USING EMBEDDED SYSTEM." Industrial Engineering Journal 54, no. 01 (2024): 70–76. https://doi.org/10.36893/iej.2024.v54i1.010.
Full textWang, Lei, Yalong Li, Xinyuan Tian, and Deyun Mo. "A design of the lightweight key management system for multi-level embedded devices." Applied Mathematics and Nonlinear Sciences 7, no. 2 (2022): 1093–104. http://dx.doi.org/10.2478/amns.2021.2.00319.
Full textAi, Hong, and Xuebin Cheng. "Research on embedded access control security system and face recognition system." Measurement 123 (July 2018): 309–22. http://dx.doi.org/10.1016/j.measurement.2018.04.005.
Full textQin, Hao Hua, Wu Sheng Hao, and Wei Shao. "Research and Development of an Embedded Security Network Card Based on AM 1808." Applied Mechanics and Materials 532 (February 2014): 235–40. http://dx.doi.org/10.4028/www.scientific.net/amm.532.235.
Full textAvani, Dave, and Dave Krunal. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.13337765.
Full textKrunal, Dave, and Dave Avani. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.12772515.
Full textMagar, Dinesh, Sanket Gadge, Shraddha Gadakh, and Prof Seema S. Lavate. "Embedded Based Vehicle Security using GSM -and GPS System." IJIREEICE 5, no. 4 (2017): 58–63. http://dx.doi.org/10.17148/ijireeice.2017.5411.
Full textWolf, Tilman, and Sri Parameswaran. "Guest editorial for special issue on embedded system security." Design Automation for Embedded Systems 12, no. 3 (2008): 171–72. http://dx.doi.org/10.1007/s10617-008-9029-8.
Full textShrivastava, Aviral, Jian-Jia Chen, Akash Kumar, and Anup Das. "ACM TECS Special Issue on Embedded System Security Tutorials." ACM Transactions on Embedded Computing Systems 22, no. 3 (2023): 1–2. http://dx.doi.org/10.1145/3594872.
Full textIkegwu, Anayo Chukwu, Victoria Chibuzo Uzuegbu, and Uzoma Alo. "Review of Embedded Systems and Cyber Threat Intelligence for Enhancing Data Security in Mobile Health." Journal of Electronic & Information Systems 7, no. 1 (2025): 98–120. https://doi.org/10.30564/jeis.v7i1.10050.
Full textDr., Thida Aung. "Parking Lot Security System using RFID Technology." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 906–10. https://doi.org/10.5281/zenodo.3589856.
Full textS., Kanagamalliga, S. Vasuki Dr., Vishnu Priya A., and Viji V. "A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM." International Journal of Information Sciences and Techniques (IJIST) 4, no. 3 (2014): 173–78. https://doi.org/10.5281/zenodo.7192438.
Full textSaranya, G., C. Senthamilarasi, and B. Vidhya. "Integrated Security System for Residential Home." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 585–87. http://dx.doi.org/10.1166/jctn.2019.7774.
Full textFujikawa, Masaki. "Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 2 (2013): 2231–40. http://dx.doi.org/10.24297/ijct.v11i2.1180.
Full textLi, Yang, Qing Hong Wu, and Xue Xiao. "Based Embedded System Applications in Intelligent Home Remote Monitoring." Applied Mechanics and Materials 602-605 (August 2014): 2317–20. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2317.
Full textM, Varaprasad Rao1, and Ch Bharta Chryulu N. "SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 7. https://doi.org/10.5281/zenodo.8233607.
Full textKhadse, Tushar S., and Swapnili P. Karmore. "A Novel Approach for Fault Tolerance Control System and Embedded System Security." Procedia Computer Science 78 (2016): 799–806. http://dx.doi.org/10.1016/j.procs.2016.02.059.
Full textDi, Ju Xing, Jian Guang Zhao, Ya Chao Si, and Jing Jin Fan. "Research on Embedded GPS/GPRS Intelligent Building Security Technology." Advanced Materials Research 756-759 (September 2013): 4161–65. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4161.
Full textYan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Full textPimentel, Andy D. "A Case for Security-Aware Design-Space Exploration of Embedded Systems." Journal of Low Power Electronics and Applications 10, no. 3 (2020): 22. http://dx.doi.org/10.3390/jlpea10030022.
Full textXu, Shengzhe, Zicheng Zhou, and Ying Guo. "Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel." Mathematics 12, no. 9 (2024): 1356. http://dx.doi.org/10.3390/math12091356.
Full textKanagamalliga, S., S. Vasuki,, A. Vishnu Priya, and V. Viji,. "A Zigbee And Embedded Based Security Monitoring And Control System." International Journal of Information Sciences and Techniques 4, no. 3 (2014): 173–78. http://dx.doi.org/10.5121/ijist.2014.4321.
Full text