Embedded Classifiers for Energy-Constrained IoT Network Security (English)
- New search for: Hasler, Jennifer
- New search for: Hasler, Jennifer
In:
Cyber-Physical Systems Security
;
285-301
;
2018
- Article/Chapter (Book) / Electronic Resource
-
Title:Embedded Classifiers for Energy-Constrained IoT Network Security
-
Contributors:Hasler, Jennifer ( author )
-
Published in:Cyber-Physical Systems Security ; 285-301
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2018-01-01
-
Size:17 pages
-
ISBN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Robust Digital Computation in the Physical WorldMayo, Jackson R. / Armstrong, Robert C. / Hulette, Geoffrey C. / Salloum, Maher / Smith, Andrew M. et al. | 2018
- 23
-
Constraint-Based Framework for Reasoning with Differential EquationsAlexandre dit Sandretto, Julien / Chapoutot, Alexandre / Mullier, Olivier et al. | 2018
- 43
-
Approximate Computing and Its Application to Hardware SecurityLiu, Weiqiang / Gu, Chongyan / Qu, Gang / O’Neill, Máire et al. | 2018
- 69
-
Mathematical Optimizations for Deep LearningGreen, Sam / Vineyard, Craig M. / Koç, Çetin Kaya et al. | 2018
- 93
-
A Zero-Entry Cyber Range Environment for Future Learning EcosystemsRaybourn, Elaine M. / Kunz, Michael / Fritz, David / Urias, Vince et al. | 2018
- 111
-
Parallel Programming in Cyber-Physical SystemsBartolini, Sandro / Peccerillo, Biagio et al. | 2018
- 135
-
Automatic Application of Software Countermeasures Against Physical AttacksBelleville, Nicolas / Heydemann, Karine / Couroussé, Damien / Barry, Thierno / Robisson, Bruno / Seriai, Abderrahmane / Charles, Henri-Pierre et al. | 2018
- 157
-
Time-Delay Attacks in Network SystemsBianchin, Gianluca / Pasqualetti, Fabio et al. | 2018
- 175
-
Attack Tree Construction and Its Application to the Connected VehicleKarray, Khaled / Danger, Jean-Luc / Guilley, Sylvain / Abdelaziz Elaabid, M. et al. | 2018
- 191
-
Reinforcement Learning and Trustworthy AutonomyLuo, Jieliang / Green, Sam / Feghali, Peter / Legrady, George / Koç, Çetin Kaya et al. | 2018
- 219
-
Identifier Randomization: An Efficient Protection Against CAN-Bus AttacksKarray, Khaled / Danger, Jean-Luc / Guilley, Sylvain / Elaabid, M. Abdelaziz et al. | 2018
- 255
-
Public Key-Based Lightweight Swarm AuthenticationCogliani, Simon / Feng, Bao / Ferradi, Houda / Géraud, Rémi / Maimuţ, Diana / Naccache, David / Portella do Canto, Rodrigo / Wang, Guilin et al. | 2018
- 269
-
Physical Security Versus Masking SchemesDanger, Jean-Luc / Guilley, Sylvain / Heuser, Annelie / Legay, Axel / Ming, Tang et al. | 2018
- 285
-
Embedded Classifiers for Energy-Constrained IoT Network SecurityHasler, Jennifer et al. | 2018
- 303
-
Challenges in Cyber Security: Ransomware PhenomenonPaşca, Vlad-Raul / Simion, Emil et al. | 2018
- 331
-
Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security SystemsRaybourn, Elaine M. / Trechter, Ray et al. | 2018