Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
9
Page No.
2371 - 2376
References
Alcaraz, C., J. Lopez, R. Roman and H.H. Chen, 2012. Selecting key management schemes for WSN applications. Comput. Secur., 31: 956-956.
Direct Link | Basile, C., D.S. Carlo and A. Scionti, 2012. FPGA-based remote-code integrity verification of programs in distributed embedded systems. IEEE. Trans. Syst. Man Cybern. C. Appl. Rev., 42: 187-200.
CrossRef | Direct Link | Garcia, F.D. and B. Jacobs, 2010. Privacy-Friendly Energy-Metering Via Homomorphic Encryption. In: Security and Trust Management, Cuellar, J., L. Javier, B. Gilles and P. Alexander (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-22443-0, pp: 226-238.
Gelbart, O., E. Leontie, B. Narahari and R. Simha, 2009. A compiler-hardware approach to software protection for embedded systems. Comput, Electr. Eng., 35: 315-328.
Direct Link | Ibrahim, M.A., Z. Shukur, N. Zainal and A.A.A. Wosabi, 2015. Software manipulative techniques of protection and detection. ARPN. J. Eng. Appl. Sci., 10: 17953-17961.
Direct Link | Kumari, P., F. Kelbert and A. Pretschner, 2011. Data protection in heterogeneous distributed systems: A smart meter example. Karlsruhe Institute of Technology, Karlsruhe, Germany.
Lowe, G., 1997. Casper: A compiler for the analysis of security protocols. Proceedings of 10th IEEE Computer Security Foundations Workshop, June 10-12, IEEE, Los Alamitos, CA., United States, pp: 18-30.
Mao, S. and T. Wolf, 2010. Hardware support for secure processing in embedded systems. IEEE Trans. Comput., 59: 847-854.
CrossRef | Nimgaonkar, S., M. Gomathisankaran and S.P. Mohanty, 2013. MEM-DnP a novel energy efficient approach for memory integrity detection and protection in embedded systems. Circuits Syst. Signal Process., 32: 2581-2604.
CrossRef | Direct Link | Nimgaonkar, S., M. Gomathisankaran and S.P. Mohanty, 2013. TSV: A novel energy efficient memory integrity verification scheme for embedded systems. J. Syst. Archit., 59: 400-411.
Direct Link | Rogers, A. and A. Milenkovic, 2009. Security extensions for integrity and confidentiality in embedded processors. Microprocess. Microsyst., 33: 398-414.
Direct Link | Ryan, P. and S.A. Schneider, 2001. The Modelling and Analysis of Security Protocols: The Csp Approach. Addison-Wesley, Boston, USA., ISBN:0-201-674718, Pages: 299.
Shaikh, R. and S. Devane, 2010. Formal verification of payment protocol using AVISPA. Int. J. Inf., 3: 326-337.
Shukur, Z., N. Alias, M.H.M. Halip and B. Idrus, 2006. Formal specification and validation of selective acknowledgement protocol using Z/EVES theorem prover. J. Applied Sci., 6: 1712-1719.
CrossRef | Direct Link | Subashini, S. and V. Kavitha, 2012. An adaptive security framework delivered as a service for cloud environment. J. Eng. Appl. Sci., 7: 468-482.
Direct Link | Sullabi, M.A. and Z. Shukur, 2008. SNL2Z: Tool for translating an informal structured software specification into formal specification. Am. J. Applied Sci., 5: 378-384.
CrossRef | Direct Link | Wosabi, A.A.A.A. and Z. Shukur, 2015. Software tampering detection in embedded systems a systematic literature review. J. Theor. Appl. Inf. Technol., 76: 211-216.
Direct Link | Wosabi, A.A.A.A., Z. Shukur and M.A. Ibrahim, 2015. Framework for software tampering detection in embedded systems. Proceeding of the 2015 International Conference on Electrical Engineering and Informatics, August 10-11, 2015, IEEE, Sepang District, Malaysia, ISBN:978-1-4673-7319-7, pp: 259-264.
Zimmer, C., B. Bhat, F. Mueller and S. Mohan, 2010. Time-based intrusion detection in cyber-physical systems. Proceedings of the 1st ACM IEEE International Conference on Cyber-Physical Systems, April 13-15, 2010, ACM, New York, USA., ISBN:978-1-4503-0066-7, pp: 109-118.