Prevention of intentional or unintentional interference with the proper operation in control systems operating critical infrastructure.
      
Cyber-physical systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The massive deployment of  CPS requires comprehensive, secure, and reliable communication. The integration of complex and heterogeneous systems makes enormous space for the adversaries to get into the network and inject malicious data. To obfuscate and mislead the attackers, we propose DDAF, a deception defense-based data acquisition framework for a hierarchical communication network of CPSs.
      
        Submitted by Mohammad Rahman on May 1st, 2021
    File
    icess2016-poster.pdf
  
              
        Submitted by Mary Grace Berdida on January 23rd, 2016
    
Event
    ICESS2016
  The Second International Conference on Electronics and Software Science (ICESS2016)
November 14-16, 2016  | Kagawa University, Takamatsu, Japan | Venue: Takamatsu Sunport Hall Building
Website: http://goo.gl/Nr9Dh8 | E-mail: icess16@sdiwc.net
IMPORTANT DATES
      
              
        Submitted by Mary Grace Berdida on January 23rd, 2016
    
Event
    2014 3PMCES Workshop
  3PMCES - Performance, Power and Predictability of Many-Core Embedded Systems
DATE 2014 Friday Workshop
The scope of the workshop is to address challenges of embedded portable software development on multi-core structures related to various performance aspects, power efficiency, correctness and reliability including aging. The workshop will present the current state of these efforts, achieved results so far, and will devise future ways of potential further enhancements.
      
              
        Submitted by Anonymous on February 18th, 2014
    
Event
    CODES+ISSS 2014
  The International Conference on Hardware/Software Codesign and System Synthesis is the premier event in the design, modeling, analysis, and implementation of modern embedded systems, from system-level specification and optimization to hardware/software implementation. The conference is a forum for active discussions on various topics of current and future importance to designers and researchers.
      
              
        Submitted by Anonymous on January 31st, 2014
    
Event
    EUC 2014
  Welcome to EUC 2014!
	
		
			Embedded and ubiquitous computing is an exciting paradigm that promises to provide computing and communication services to the end users all the time and everywhere. Its systems are now invading in every aspect of our daily life and promise to revolutionize our life much more profoundly than elevators, electric motors or even personal computer evolution ever did.
      
              
        Submitted by Anonymous on January 8th, 2014
    
Event
    DAC 2014
  Design Methods for Automotive Systems and Software
The automotive track has been created this year to bring together researchers and practitioners from the automotive domain with their counterparts from the embedded systems & software (ESS) domains.  This also includes those from the electronic design automation (EDA) space.
      
              
        Submitted by Anonymous on November 11th, 2013
    
Event
    RTCSA 2014
  The 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2014) will be held in Chongqing, China. 
      
              
        Submitted by Anonymous on November 11th, 2013
    
Event
    SASO 2013
   
Seventh IEEE International Conference
	on Self-Adaptive and Self-Organizing Systems
Philadelphia, USA; September 9-13, 2013
 
The 2013 edition of the Self-Adaptive and Self-Organizing systems conference (SASO) will be held in Philadelphia, PA, USA, and hosted by Drexel University, in the week of September 9-13, 2013.
      
              
        Submitted by Anonymous on April 19th, 2013
    
This session of the SAE 2013 World Congress focuses on processes, methods, and tools for the design, analysis, and synthesis of cyber secure automotive embedded systems. The analysis aspect shall cover static code analysis methods and tools for analyzing the vulnerabilities of embedded software (application and platform) prior to their deployment on the target HW.
      
              
        Submitted by Anonymous on March 4th, 2013
    
Feedback
  Feedback
        If you experience a bug or would like to see an addition or change on the current page, feel free to leave us a message.