SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Analytical review of cybersecurity for embedded systems

A Aloseel, H He, C Shaw, MA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
To identify the key factors and create the landscape of cybersecurity for embedded systems
(CSES), an analytical review of the existing research on CSES has been conducted. The …

[HTML][HTML] Application of wearable devices based on artificial intelligence sensors in sports human health monitoring

Y Yang - Measurement: Sensors, 2024 - Elsevier
With the orderly development of society and economy, people pay more and more attention
to sports. How to effectively protect the safety of athletes has become more and more …

A systematic review on security aware real-time task scheduling

S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …

Diffusion geometry derived keypoints and local descriptors for 3d deformable shape analysis

X Wang, M Bennamoun, F Sohel… - Journal of Circuits, Systems …, 2021 - World Scientific
Geometric analysis of three-dimensional (3D) surfaces with local deformations is a
challenging task, required by mobile devices. In this paper, we propose a new local feature …

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …

Attack-detection architectural framework based on anomalous patterns of system performance and resource utilization—Part II

A Aloseel, S Al-Rubaye, A Zolotas, C Shaw - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents a unique security approach for detecting cyber-attacks against
embedded systems (ESs). The proposed approach has been shaped within an architectural …

A novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization-part I

A Aloseel, S Al-Rubaye, A Zolotas, H He… - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents a novel security approach called Anomalous Resource Consumption
Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in …

A low-cost image encryption method to prevent model stealing of deep neural network

W Jiang, Z Gong, J Zhan, Z He, W Pan - Journal of Circuits, Systems …, 2020 - World Scientific
Model stealing attack may happen by stealing useful data transmitted from embedded end to
server end for an artificial intelligent systems. In this paper, we are interested in preventing …

Intrusion detection for in-vehicle CAN bus based on lightweight neural network

D Ding, Y Wei, C Cheng, J Long - Journal of Circuits, Systems and …, 2023 - World Scientific
With the rapid development of automobile intelligent and networking, substantial information
is exchanged between in-vehicle network system and the outside world, thereby threatening …