Deakin University
Browse

Embedded device forensics and security

Download (78.21 kB)
Version 2 2024-06-06, 02:53
Version 1 2017-04-14, 00:00
journal contribution
posted on 2024-06-06, 02:53 authored by KKR Choo, Y Fei, Y Xiang, Y Yu
© 2016 is held by the owner/author(s).While the increasing digitalization of our society and amalgamation of embedded devices into the ever-increasing facets of our daily life (e.g., in smart and intelligent vehicles, smart cities and smart nations, and critical infrastructure sectors) have resulted in improved productivity and quality of life, the trend has also resulted in a trend of increasing frequency and sophistication of cyber exploitation and cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns using both cryptographic and non-cryptographic solutions, such as those presented in this special section.

History

Related Materials

  1. 1.

Location

New York, N.Y.

Open access

  • Yes

Language

eng

Publication classification

C Journal article, C1 Refereed article in a scholarly journal

Copyright notice

2016, the authors

Journal

ACM transactions on embedded computing systems

Volume

16

Article number

50

Pagination

1-5

ISSN

1539-9087

eISSN

1558-3465

Issue

2

Publisher

Association for Computing Machinery