2021 Systems and Information Engineering Design Symposium (SIEDS) 2021
DOI: 10.1109/sieds52267.2021.9483779
|View full text |Cite
|
Sign up to set email alerts
|

Trust and Security of Embedded Smart Devices in Advanced Logistics Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Ongoing work in the field of engineering systems is focused on disrupted order rather than disrupted performance. The multi-criteria preference method (Karvetski et al, 2010;Moghadasi, Collier, et al, 2022;Montibeller et al, 2006;VanYe et al, 2021) can be used to identify priorities, the most and least disruptive scenarios, emergent conditions, criteria, and initiatives (Moghadasi, Luu, et al, 2022). Examples of priorities are the importance orders of endangered species, radiological, chemical, or biological contaminants, critical infrastructure assets, future projects or investments, policies, key personnel or organizations, geographic locations, and others.…”
Section: Discussionmentioning
confidence: 99%
“…Ongoing work in the field of engineering systems is focused on disrupted order rather than disrupted performance. The multi-criteria preference method (Karvetski et al, 2010;Moghadasi, Collier, et al, 2022;Montibeller et al, 2006;VanYe et al, 2021) can be used to identify priorities, the most and least disruptive scenarios, emergent conditions, criteria, and initiatives (Moghadasi, Luu, et al, 2022). Examples of priorities are the importance orders of endangered species, radiological, chemical, or biological contaminants, critical infrastructure assets, future projects or investments, policies, key personnel or organizations, geographic locations, and others.…”
Section: Discussionmentioning
confidence: 99%
“…Te rapid development of computing and communications technology has led to the widespread use of embedded systems in smart devices. Given the increasing connectivity of systems and the difculty of providing comprehensive security, embedded systems are often attacked by malicious parties [1][2][3][4][5]. For example, application-level rootkits typically use code with Trojan characteristics to replace the binary code of a normal application, or they can use other means to modify the behavior of an existing application [6].…”
Section: Introductionmentioning
confidence: 99%