The increasing popularity of Unmanned Aerial Vehicle (UAV) swarms is attributed to their ability to generate substantial returns for various industries at a low cost. Additionally, in the …
Cloud computing systems fail in complex and unforeseen ways due to unexpected combinations of events and interactions among hardware and software components. These …
Medical devices require the provision of life-critical functionality even under adverse conditions. We imagine to model (at design time) and to switch (at run-time) security modes …
AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - 2023 - researchgate.net
abstract Context: Timing side-channel attack countermeasure techniques (TSCA-CTs) evaluation is a multi-criteria decision-making (MCDM) problem based on different MPSoCs …
S Majumder, MK Deb Barma, A Saha… - … Intelligence for Unmanned …, 2022 - Springer
In this chapter, a False Data Injection attack is investigated for smart-car platooning in real time. ARP spoofing based silent listening technique is utilized to implement the attack …
Network-connected medical devices and the Internet of Medical Things (IoMT) promise to improve patient care and efficiency. At the same time, they increase the security risk. The …
Cyber-physical systems integrate powerful computing (real-time embedded system, operating system, applications, and Internet networking) and physical environment …