Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Undergraduate embedded system education at Carnegie Mellon
ACM Transactions on Embedded Computing Systems (TECS)
Using Battery Constraints within Mobile Hosts to Improve Network Security
IEEE Security and Privacy
Worst-case execution time analysis of security policies for deeply embedded real-time systems
ACM SIGBED Review - Special issue on the RTSS forum on deeply embedded real-time computing
Hardware-assisted run-time monitoring for secure program execution on embedded processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Safety and security in industrial control
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Ubiquitous verification of ubiquitous systems
SEUS'10 Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling
ACM Transactions on Embedded Computing Systems (TECS)
Configuration-based approach to embedded device security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Hi-index | 4.10 |
Security for embedded systems involves issues beyond those problems currently being addressed for enterprise and desktop computing.