Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks.
Jiankang RenChunxiao LiuChi LinRan BiSimeng LiZheng WangYicheng QianZhichao ZhaoGuozhen TanPublished in: ACM Trans. Embed. Comput. Syst. (2023)
Keyphrases
- scheduling problem
- information security
- biometric template
- scheduling algorithm
- countermeasures
- protection mechanisms
- security mechanisms
- security threats
- security problems
- security level
- computer security
- cyber attacks
- security issues
- security protocols
- security measures
- critical infrastructure
- security architecture
- security vulnerabilities
- java card
- security risks
- protection scheme
- shop floor
- security breaches
- network security
- resource constrained
- sensitive data
- preventive maintenance
- malicious users
- denial of service attacks
- fault injection
- cryptographic protocols
- cyber security
- personal data
- data protection
- biometric data
- security flaws
- protection schemes
- intrusion detection
- response time
- resource constraints
- deteriorating jobs
- access control
- smart card
- np hard
- dos attacks
- chosen plaintext
- information leakage
- identity theft
- stream cipher
- single machine
- biometric systems
- security requirements
- defense mechanisms
- key management
- processing times
- anomaly detection
- attack scenarios
- buffer overflow
- scheduling decisions
- ddos attacks