[HTML][HTML] A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria …

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - Egyptian Informatics …, 2023 - Elsevier
Context Timing side-channel attack countermeasure techniques (TSCA-CTs) evaluation is a
multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …

A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures

X Wang, Z Zhao, L Yi, Z Ning, L Guo, FR Yu… - ACM Computing …, 2024 - dl.acm.org
The increasing popularity of Unmanned Aerial Vehicle (UAV) swarms is attributed to their
ability to generate substantial returns for various industries at a low cost. Additionally, in the …

[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform

D Cotroneo, L De Simone, P Liguori… - Journal of Systems and …, 2023 - Elsevier
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …

Context-aware security modes for medical devices

M Riegler, J Sametinger… - 2022 Annual Modeling …, 2022 - ieeexplore.ieee.org
Medical devices require the provision of life-critical functionality even under adverse
conditions. We imagine to model (at design time) and to switch (at run-time) security modes …

[PDF][PDF] Egyptian Informatics Journal

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - 2023 - researchgate.net
abstract Context: Timing side-channel attack countermeasure techniques (TSCA-CTs)
evaluation is a multi-criteria decision-making (MCDM) problem based on different MPSoCs …

Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning

S Majumder, MK Deb Barma, A Saha… - … Intelligence for Unmanned …, 2022 - Springer
In this chapter, a False Data Injection attack is investigated for smart-car platooning in real
time. ARP spoofing based silent listening technique is utilized to implement the attack …

[PDF][PDF] RESILIENT MIDDLEWARE FOR SMART SECURITY IN MEDICAL DEVICES

J Sametinger, JW Rozenblit - marshallplan.at
Network-connected medical devices and the Internet of Medical Things (IoMT) promise to
improve patient care and efficiency. At the same time, they increase the security risk. The …

[PDF][PDF] Specifics and Vulnerabilities of the Timing Control in Cyber-Physical Systems

I Georgiev, I Georgiev - academia.edu
Cyber-physical systems integrate powerful computing (real-time embedded system,
operating system, applications, and Internet networking) and physical environment …

[PDF][PDF] A Complete Bibliography of ACM Transactions on Embedded Computing Systems (TECS)

NHF Beebe - 2025 - ctan.math.utah.edu
[BCHL19, BCEP12, BM13, CP13a, CDBB24, CKGN14, CC14, CBH22a, CBH22b, CP13b,
DV13, DGG24, DSD12, Edi13, FM12, GV21b, Goe14, GP07, HCK+08, HTLC10, Hüb13 …