Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems.
Akshay DuaNirupama BulusuWu-chang FengWen HuPublished in: ACM Trans. Embed. Comput. Syst. (2014)
Keyphrases
- embedded systems
- data integrity
- crowd sourced
- low cost
- database design
- software systems
- hardware software
- embedded software
- data storage
- embedded real time systems
- database systems
- distributed databases
- crowd sourcing
- client server
- databases
- software development
- active learning
- flash memory
- database management systems
- data management
- source code
- management system
- case study
- real time