Filters








30,003 Hits in 4.6 sec

Safe and secure software updates on high-performance embedded systems

Irune Agirre
2020 Zenodo  
Autonomy is commonly achieved with the support of artificial intelligence algorithms that pose high computing demands on the hardware platform, reaching a high performance scale.  ...  These software updates are not only convenient for critical bug fixing but also necessary for keeping the interconnected system resilient against security threats.  ...  As a consequence, the adoption of OTASU in dependable autonomous systems requires of novel safety and security co-engineering approaches and mechanisms to achieve certification and gain enough experience  ... 
doi:10.5281/zenodo.4006369 fatcat:ihnrg5qtfzaetksyk3rwgiyyuq

The 5th dimension in conflict management - XYZT+capability

Alexander Kuenz
2015 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC)  
architectures; safety-critical avionics; mission planning, and operations; risk management methods; computer aided design.  ...  This is overlaid on top of current safety requirements, increasing security requirements, and the emergence of machine learning in design and operation.  ... 
doi:10.1109/dasc.2015.7311331 fatcat:cyqiihicibbxjfve6kygr5kcqa

World-Wide Air Traffic: Route-based versus Direct

Alexander Kuenz
2018 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC)  
architectures; safety-critical avionics; mission planning, and operations; risk management methods; computer aided design.  ...  This is overlaid on top of current safety requirements, increasing security requirements, and the emergence of machine learning in design and operation.  ... 
doi:10.1109/dasc.2018.8569313 fatcat:jkihybudnzcy5pdkrynsu63m7m

Conference Tracks

2018 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC)  
Notwithstanding, researchers and practitioners on the field continuously propose new methods, techniques and tools at a great pace, most often with a final claim on system and software quality improvement  ...  His principal research interests are Requirements Engineering (RE), Advanced Modularity, Model-Driven Engineering (MDE), and Software Product Lines (SPL), where, he has published several papers on these  ...  This Thematic Track focuses on the safety and security aspects of complex software systems.  ... 
doi:10.1109/quatic.2018.00010 fatcat:tekesyuztrhmlngh2rhqft4a2y

Compass '94, Ninth Annual Conference on Computer Assurance - Gaithersburg, Md - June 27 July 1, 1994

L.M. Ippolito, D.R. Wallace, E.B. Lennon
1994 Journal of Research of the National Institute of Standards and Technology  
; and David Barton, Intermetrics Corporation.  ...  Acknowledgments The authors wish to acknowledge the following people for their contributions to this article: Joseph Poole, NIST; Wayne Salamon, NIST; James Graham, NIST; Uma Satyen, The MITRE Corporation  ...  The dependence on critical systems demands that the systems are built with safety and security assurances.  ... 
doi:10.6028/jres.099.072 fatcat:xcmn2ohgsjenrjvve36m63chye

SEREIN Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains

Artem Boyarchuk, Oleg Illiashenko, Vyacheslav Kharchenko, Jüri Vain
2016 Information & Security: An International Journal  
The paper presents the on-going EC-funded Tempus project TEMPUS SEREIN (Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains, http://serein.net.ua) executed  ...  The state-of-theart, completed work as well as the next steps of the development of teaching courses of master and doctoral level and in-service training modules on security and resilience for human and  ...  Acknowledgments The coordinators express their thanks to the EU members from different organizations for their interest in the project and for their continued assistance in the various activities.  ... 
doi:10.11610/isij.3502 fatcat:7js5xmbaj5cflmo5a35hrgdcoa

[Front matter]

2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
The keynote, visionary, and panels take place live on its "main stage" for the most seamless experience for both speakers and attendees.  ...  The Program Chairs tracked the number of years each candidate has served on the TPC. Past and potential TPC members outline their top ten topics of expertise in hardware and systems security.  ...  security, security-aware computer aided design (CAD), and side channel analysis.  ... 
doi:10.1109/host45689.2020.9300269 fatcat:nruhx3qym5evvpk3bbki7pvfdq

Design, Development and Implementation of a Master of Science Program for Chemical and Nuclear Engineering: Integration of CAPE (Modelling, Simulation and Control) Skills

A. Goryunov, V. Dyadik, S. Liventsov, K. Kozin, F. Manenti, S. Pierucci
2015 Chemical Engineering Transactions  
The paper deals with the definition of guidelines to integrate the topics Computer-Aided Process Engineering (CAPE), specifically modeling, simulation and control, with the nuclear engineering field.  ...  Russian Federation) for specialists skilled in chemical engineering as well as in nuclear physics and chemistry of radioactive elements.  ...  Acknowledgements The work was supported by the Tomsk Polytechnic University and Politecnico di Milano under the agreement for scientific and academic collaboration.  ... 
doi:10.3303/cet1543252 doaj:20a09fe5b0d642a69f1dab26ad7046a1 fatcat:hna3ztkfwjfgxndmc3wxdx7v6a

Bridging the stakeholder communities that produce cyber-physical systems

Charles Robinson
2021 Zenodo  
The development of cyber-physical systems (CPS) involves many technology and influencer communities.  ...  Novel approaches and tools will be required to tackle the multi-dimensional challenges that connect these communities in order to achieve the desired benefits of future CPS.  ...  safety and security.  ... 
doi:10.5281/zenodo.4710685 fatcat:yj6od67nrvaotix4jvteajavyi

Digital Technologies in the Architecture, Engineering and Construction (AEC) Industry—A Bibliometric—Qualitative Literature Review of Research Activities

Bilal Manzoor, Idris Othman, Juan Carlos Pomares
2021 International Journal of Environmental Research and Public Health  
., 11,047 publications for the AEC industry, 1956 for DTs and 1778 for DTs in the AEC industry).  ...  data sharing, reduction in building waste, increased productivity, sustainable performance and safety improvement.  ...  Some researchers claim that 'construction automation' is the combination of computer-aided design and robot-based on-site techniques to accelerate overall activities [89] .  ... 
doi:10.3390/ijerph18116135 pmid:34204147 pmcid:PMC8201284 fatcat:mxui5o2a7fc5thy56swmipeis4

Blockchains for Scalable IoT Management, Access, and Accountability

Bechir Hamdaoui, Ammar Rayes, Nizar Zorba, Lingyang Song, Christos Verikoukis
2020 IEEE Network  
He was the General Chair of the 17th, 18th, and 19th IEEE Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD), and the TPC Co-Chair of the 15th IEEE International  ...  His research interests are in the general areas of computer networks, wireless communication, and computer security.  ... 
doi:10.1109/mnet.2020.8977438 fatcat:xjlyrcxrczdbrcctnlwssigb74

Industry Fire Safety System using Embedded Technology with Internet of Things

2019 International journal of recent technology and engineering  
This paper keeps tabs to the security also security of the article of clothing plant disappointments and outrage on his/her staff need getting to be a most amazing issue currently a times.  ...  Those depositors aren't demonstrating to whatever enthusiasm toward this segment and fact that this division may be getting toner.  ...  Temperature Sensor Co Sensor This sensor is utilized for sensing Furthermore securing against hearth and may be a straightforward and conservative gadget.  ... 
doi:10.35940/ijrte.b1151.0982s1019 fatcat:5oqfrw6pjfefxfquacde5kxhwa

Special Issue on Biomedical Monitoring Technologies

C.P. Loizou, M. Morega, E.C. Kyriacou, S. Pasca, S. Petroudi, P.D. Bamidis, M.S. Pattichis, C.S. Pattichis
2013 Zenodo  
Special Issue on Biomedical Monitoring Technologies: Selected Papers from the 12th IEEE International Conference on BioInformatics and BioEngineering (BIBE 2012) and the 8th International Symposium on  ...  Advanced Topics in Electrical Engineering (ATEE 2013), Part 2  ...  Dobrescu and co-workers, propose an integrated system that ensures the radiation safety and security of the patients investigated by radiological imaging methods such as radiographies, computed tomographies  ... 
doi:10.5281/zenodo.2592139 fatcat:3e7kcgathbg6jhawnqa3vs5h3y

VANETs and Internet of Things (IoT): A Discussion

Shahirah Mohamed Hatim, Shamsul Jamel Elias, Norkhushaini Awang, Mohd Yusof Darus
2018 Indonesian Journal of Electrical Engineering and Computer Science  
This paper aims to discuss and illustrate the main challenges and drawbacks; the routing protocols, security and privacy experienced by VANETs respectively.  ...  Section I of this paper provides a brief explanation on VANETs and IoT, section II discusses the main challenges suffered by VANETs and IoT, section III covers on the existing applications of VANETs and  ...  ACKNOWLEDGMENT The authors would like to thank the Faculty of Computer and Mathematical Sciences (FSKM), Universiti Teknologi Mara (UiTM) for sponsoring this research.  ... 
doi:10.11591/ijeecs.v12.i1.pp218-224 fatcat:qmv43rqbibcgzlk23ulxn22fju

Hybrid Cloud Storage for Secure Authorization and Information Hiding

2019 International Journal of Engineering and Advanced Technology  
Distributed database is the emerging technique which focuses on concurrency control and safety problems underneath this allocated database.  ...  Its essential traits are the low memory and computational necessities as providing a immoderate security degree. It is a totally well-prepared public-key cryptosystem.  ...  This studies work explores the number one skills of facts mining strategies in cloud computing and securing the records.  ... 
doi:10.35940/ijeat.f1082.0886s19 fatcat:ig7rm7v3nrcujja6lqxcolovqu
« Previous Showing results 1 — 15 out of 30,003 results