Зарегистрироваться
Восстановить пароль
FAQ по входу

Biedermann A., Molter G.H. (eds.) Design Methodologies for Secure Embedded Systems

  • Файл формата pdf
  • размером 4,11 МБ
  • Добавлен пользователем
  • Описание отредактировано
Biedermann A., Molter G.H. (eds.) Design Methodologies for Secure Embedded Systems
New York: Springer, 2010. — 222 p.
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация