An Approach to Restore the Proper Functioning of Embedded Systems Due to Cyber Threats.
Serhii ToliupaSerhii ShtanenkoOleksiy SilkoPavlo KhusainovAndrii KulkoPublished in: IT&I (2023)
Keyphrases
- embedded systems
- cyber security
- cyber physical systems
- low cost
- cyber crime
- embedded devices
- embedded software
- real time systems
- resource limited
- intrusion detection
- smart grid
- computing power
- cyber attacks
- field programmable gate array
- hw sw
- hardware software
- safety critical
- identity theft
- real time image processing
- embedded real time systems
- processing power
- security issues
- software systems
- critical infrastructure
- information security
- communication technologies
- countermeasures
- flash memory
- cooperative
- network security
- intrusion detection system
- consumer electronics
- relational databases