Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with in...
详细信息
As the demand for reliable and accurate electricity metering escalates in the digital era, traditional systems increasingly need to improve due to their centralized nature, prone to inaccuracies, privacy breaches, and...
详细信息
With the modern city infrastructure and increasing number of subjects in the traffic environment, there is a need for increased number of parking places. As the parking place is usually not used for a whole day, it co...
详细信息
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
Optimizing therapy and rehabilitation for Parkinson's disease (PD) requires early identification and precise evaluation of the illness's course. However, there is disagreement about the best way to use gait an...
详细信息
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per...
详细信息
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun...
详细信息
In order to achieve the goal of a carbon-neutral power system, significant changes to the power grid are underway, necessitating enhanced interoperability between Transmission System Operators (TSOs) and Distribution ...
详细信息
There is a lack of cybersecurity experts, and this problem is getting worse with the increasing number and importance of IT systems together with rising number and sophistication of attacks. Rapid development in cyber...
详细信息
The modern networking world is being exposed to many risks more frequently every day. Most of systems strongly rely on remaining anonymous throughout the whole endpoint exploitation process. Covert channels represent ...
详细信息
暂无评论