This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It...Lasīt vairāk
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It...Lasīt vairāk
Build secure and reliable IoT applications for micro:bit and Raspberry Pi Pico by using Rust and Tock. One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling you to buil...Lasīt vairāk
Build secure and reliable IoT applications for micro:bit and Raspberry Pi Pico by using Rust and Tock. One of the first Operating Systems written in Rust, Tock is designed to safely run multiple applications on low power devices, enabling you to buil...Lasīt vairāk
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fiel...Lasīt vairāk
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fiel...Lasīt vairāk
(Izdošanas datums: 18-Dec-2017, EPUB+DRM, Izdevniecība: De Gruyter, ISBN-13: 9783110476095)
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the ap...Lasīt vairāk
(Izdošanas datums: 18-Dec-2017, PDF+DRM, Izdevniecība: De Gruyter, ISBN-13: 9783110477597)
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the ap...Lasīt vairāk
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
(Izdošanas datums: 15-Dec-2017, PDF+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781000031430)
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a...Lasīt vairāk
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
(Izdošanas datums: 15-Dec-2017, EPUB+DRM, Izdevniecība: Taylor & Francis Ltd, ISBN-13: 9781351700825)
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a...Lasīt vairāk
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed an...Lasīt vairāk
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed an...Lasīt vairāk
(Izdošanas datums: 06-Oct-2015, EPUB+DRM, Izdevniecība: Taylor & Francis Inc, ISBN-13: 9781040056981)
Think about someone taking control of your car while youre driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems...Lasīt vairāk
(Izdošanas datums: 06-Oct-2015, PDF+DRM, Izdevniecība: Taylor & Francis Inc, ISBN-13: 9781498700993)
Think about someone taking control of your car while youre driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems...Lasīt vairāk
(Izdošanas datums: 31-Aug-2015, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662483244)
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully revi...Lasīt vairāk
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussio...Lasīt vairāk
(Izdošanas datums: 12-Sep-2014, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662447093)
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and...Lasīt vairāk
Sērija : Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
(Izdošanas datums: 25-Sep-2013, PDF+DRM, Izdevniecība: Taylor & Francis Inc, ISBN-13: 9781466575318)
Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world...Lasīt vairāk
Sērija : Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
(Izdošanas datums: 25-Sep-2013, EPUB+DRM, Izdevniecība: Taylor & Francis Inc, ISBN-13: 9781498760140)
Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world...Lasīt vairāk