Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Guaranteed physical security with restart-based design for cyber-physical systems
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …
Preserving physical safety under cyber attacks
Physical plants that form the core of the cyber-physical systems (CPSs) often have stringent
safety requirements and, recent attacks have shown that cyber intrusions can cause damage …
safety requirements and, recent attacks have shown that cyber intrusions can cause damage …
Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
Protecting actuators in safety-critical IoT systems from control spoofing attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …
edge devices with timing requirements from control spoofing attacks where an adversary …
Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices
K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …
maintained by a remote server to enforce security updates, ideally through machine-to …
A simplex architecture for intelligent and safe unmanned aerial vehicles
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research
purposes. However, they also possess serious threats to the society because faults in UAVs …
purposes. However, they also possess serious threats to the society because faults in UAVs …
A design-space exploration for allocating security tasks in multicore real-time systems
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
A short review of security-aware techniques in real-time embedded systems
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …
facilitated while also experiencing security threats as a result of cyber-attacks and system …