Embedded device forensics and security
Version 2 2024-06-06, 02:53Version 2 2024-06-06, 02:53
Version 1 2017-04-14, 00:00Version 1 2017-04-14, 00:00
journal contribution
posted on 2024-06-06, 02:53 authored by KKR Choo, Y Fei, Y Xiang, Y Yu© 2016 is held by the owner/author(s).While the increasing digitalization of our society and amalgamation of embedded devices into the ever-increasing facets of our daily life (e.g., in smart and intelligent vehicles, smart cities and smart nations, and critical infrastructure sectors) have resulted in improved productivity and quality of life, the trend has also resulted in a trend of increasing frequency and sophistication of cyber exploitation and cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns using both cryptographic and non-cryptographic solutions, such as those presented in this special section.
History
Related Materials
- 1.
Location
New York, N.Y.Open access
- Yes
Link to full text
Language
engPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2016, the authorsJournal
ACM transactions on embedded computing systemsVolume
16Article number
50Pagination
1-5ISSN
1539-9087eISSN
1558-3465Issue
2Publisher
Association for Computing MachineryUsage metrics
Categories
Keywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

