Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems
暂无分享,去创建一个
Krishna K. Venkatasubramanian | Josiah D. Hester | Hang Cai | Tianlong Yun | K. Venkatasubramanian | Hang Cai | Tianlong Yun
[1] Thomas S. Heydt-Benjamin,et al. s ecurity and p rivacy for Implantable medical Devices Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional goals such as safety and utility. , 2008 .
[2] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[3] Krishna K. Venkatasubramanian,et al. Detecting Signal Injection Attack-Based Morphological Alterations of ECG Measurements , 2016, 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS).
[4] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[5] Shyamal Patel,et al. Mercury: a wearable sensor network platform for high-fidelity motion analysis , 2009, SenSys '09.
[6] Ryan J. Halter,et al. Amulet: An Energy-Efficient, Multi-Application Wearable Platform , 2016, SenSys.
[7] Nicholas Francis Brown,et al. SCREAM: Sensory Channel Remote Execution Attack Methods , 2016 .