MILCOM 2016 - 2016 IEEE Military Communications Conference 2016
DOI: 10.1109/milcom.2016.7795474
|View full text |Cite
|
Sign up to set email alerts
|

Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…(3) the study of the spatial network pattern based on sequence information in cyberspace. For example, Clark [1][2][3][4][5][6][7] designed trustworthy mechanisms and access control models to ensure the security of cyberspace. Chawki [8] tried to find the balance between privacy and security.…”
Section: Introductionmentioning
confidence: 99%
“…(3) the study of the spatial network pattern based on sequence information in cyberspace. For example, Clark [1][2][3][4][5][6][7] designed trustworthy mechanisms and access control models to ensure the security of cyberspace. Chawki [8] tried to find the balance between privacy and security.…”
Section: Introductionmentioning
confidence: 99%