Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Analytical review of cybersecurity for embedded systems
To identify the key factors and create the landscape of cybersecurity for embedded systems
(CSES), an analytical review of the existing research on CSES has been conducted. The …
(CSES), an analytical review of the existing research on CSES has been conducted. The …
[HTML][HTML] Application of wearable devices based on artificial intelligence sensors in sports human health monitoring
Y Yang - Measurement: Sensors, 2024 - Elsevier
With the orderly development of society and economy, people pay more and more attention
to sports. How to effectively protect the safety of athletes has become more and more …
to sports. How to effectively protect the safety of athletes has become more and more …
A systematic review on security aware real-time task scheduling
S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …
time application due to the rapidly enhanced use of such applications. This study presents a …
Diffusion geometry derived keypoints and local descriptors for 3d deformable shape analysis
Geometric analysis of three-dimensional (3D) surfaces with local deformations is a
challenging task, required by mobile devices. In this paper, we propose a new local feature …
challenging task, required by mobile devices. In this paper, we propose a new local feature …
Maximizing the security level of real-time software while preserving temporal constraints
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …
(IoT) and edge computing domains, where they are often employed as the control entity of a …
Attack-detection architectural framework based on anomalous patterns of system performance and resource utilization—Part II
This paper presents a unique security approach for detecting cyber-attacks against
embedded systems (ESs). The proposed approach has been shaped within an architectural …
embedded systems (ESs). The proposed approach has been shaped within an architectural …
A novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization-part I
This paper presents a novel security approach called Anomalous Resource Consumption
Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in …
Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in …
A low-cost image encryption method to prevent model stealing of deep neural network
Model stealing attack may happen by stealing useful data transmitted from embedded end to
server end for an artificial intelligent systems. In this paper, we are interested in preventing …
server end for an artificial intelligent systems. In this paper, we are interested in preventing …
Intrusion detection for in-vehicle CAN bus based on lightweight neural network
D Ding, Y Wei, C Cheng, J Long - Journal of Circuits, Systems and …, 2023 - World Scientific
With the rapid development of automobile intelligent and networking, substantial information
is exchanged between in-vehicle network system and the outside world, thereby threatening …
is exchanged between in-vehicle network system and the outside world, thereby threatening …