Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
Over the last decade, machine learning (ML) and deep learning (DL) algorithms have significantly evolved and been employed in diverse applications, such as computer vision …
S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor search on a large set of high dimensional points as a basic operation for query processing …
RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, techniques for securing embedded systems software have not been widely …
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …
Memory corruption attacks such as code injection, code reuse, and non-control data attacks have become widely popular for compromising safety-critical Cyber–Physical Systems …
Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are …
Schedule randomization is one of the recently introduced security defenses against schedule-based attacks, ie, attacks whose success depends on a particular ordering …
K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to …