Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Koen Zandberg"'
Publikováno v:
IEEE Access, Vol 12, Pp 167810-167826 (2024)
More and more, edge devices embark Artificial Neuron Networks. In this context, a trend is to simultaneously decentralize their training as much as possible while shrinking their resource requirements, both for inference and training—tasks that are
Externí odkaz:
https://doaj.org/article/0c5eb8aa2a974d9da19e1833b1c4fe7e
Publikováno v:
IEEE Access, Vol 7, Pp 71907-71920 (2019)
While the IoT deployments multiply in a wide variety of verticals, the most IoT devices lack a built-in secure firmware update mechanism. Without such a mechanism, however, critical security vulnerabilities cannot be fixed, and the IoT devices can be
Externí odkaz:
https://doaj.org/article/f7ebfbd1316c4cc79087b5f6e76d477e
Publikováno v:
Middleware 2022-23rd ACM/IFIP International Conference Middleware
Middleware 2022-23rd ACM/IFIP International Conference Middleware, Nov 2022, quebec, Canada. pp.1-12, ⟨10.1145/3528535.3565242⟩
Middleware 2022-23rd ACM/IFIP International Conference Middleware, Nov 2022, Quebec, Canada. pp.1-12, ⟨10.1145/3528535.3565242⟩
Middleware 2022-23rd ACM/IFIP International Conference Middleware, Nov 2022, quebec, Canada. pp.1-12, ⟨10.1145/3528535.3565242⟩
Middleware 2022-23rd ACM/IFIP International Conference Middleware, Nov 2022, Quebec, Canada. pp.1-12, ⟨10.1145/3528535.3565242⟩
Low-power operating system runtimes used on IoT microcontrollers typically provide rudimentary APIs, basic connectivity and, sometimes, a (secure) firmware update mechanism. In contrast, on less constrained hardware, networked software has entered th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::efc760bd7f1a2b693a0aaaec9863fa0c
http://arxiv.org/abs/2210.03432
http://arxiv.org/abs/2210.03432
Autor:
Shenghao Yuan, Frédéric Besson, Jean-Pierre Talpin, Samuel Hym, Koen Zandberg, Emmanuel Baccelli
Publikováno v:
CAV 2022-34th International Conference on Computer Aided Verification
CAV 2022-34th International Conference on Computer Aided Verification, Aug 2022, Haifa, Israel. pp.1-23
HAL
CAV 2022-34th International Conference on Computer Aided Verification, Aug 2022, Haifa, Israel. pp.1-23
HAL
International audience; RIOT is a micro-kernel dedicated to IoT applications that adopts eBPF (extended Berkeley Packet Filters) to implement so-called femto-containers. As micro-controllers rarely feature hardware memory protection, the isolation of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5e94c904fed1f63126a9447143264025
https://inria.hal.science/hal-03888082/file/cav22.pdf
https://inria.hal.science/hal-03888082/file/cav22.pdf
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
LNCS-Lecture Notes in Computer Science
ACNS 2022-International Conference on Applied Cryptography and Network Security
ACNS 2022-International Conference on Applied Cryptography and Network Security, Jun 2022, Rome, Italy. pp.872-891, ⟨10.1007/978-3-031-09234-3_43⟩
LNCS-Lecture Notes in Computer Science
ACNS 2022-International Conference on Applied Cryptography and Network Security
ACNS 2022-International Conference on Applied Cryptography and Network Security, Jun 2022, Rome, Italy. pp.872-891, ⟨10.1007/978-3-031-09234-3_43⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fc957fea9795597d6594b5472f20b9e1
https://doi.org/10.1007/978-3-031-09234-3_43
https://doi.org/10.1007/978-3-031-09234-3_43
Autor:
Koen Zandberg, Emmanuel Baccelli
Publikováno v:
HAL
PEMWN 2020-9th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks
PEMWN 2020-9th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Dec 2020, Berlin / Virtual, Germany
PEMWN
PEMWN 2020-9th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks
PEMWN 2020-9th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, Dec 2020, Berlin / Virtual, Germany
PEMWN
to be published in the proceedings of IFIP/IEEE PEMWN 2020; International audience; Virtual machines (VM) are widely used to host and isolate software modules. However, extremely small memory and low-energy budgets have so far prevented wide use of V
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::45879325bfc3e3be1fcd4c80ed87c6cd
Publikováno v:
IEEE Access
IEEE Access, IEEE, 2019, 7, pp.71907-71920. ⟨10.1109/ACCESS.2019.2919760⟩
IEEE Access, Vol 7, Pp 71907-71920 (2019)
IEEE Access, 2019, 7, pp.71907-71920. ⟨10.1109/ACCESS.2019.2919760⟩
IEEE Access, IEEE, 2019, 7, pp.71907-71920. ⟨10.1109/ACCESS.2019.2919760⟩
IEEE Access, Vol 7, Pp 71907-71920 (2019)
IEEE Access, 2019, 7, pp.71907-71920. ⟨10.1109/ACCESS.2019.2919760⟩
International audience; While IoT deployments multiply in a wide variety of verticals, most IoT devices lack a built-in secure firmware update mechanism. Without such a mechanism, however, critical security vulnerabilities cannot be fixed, and IoT de
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a51dc53ea7634bd9123a4dbed34aa465
https://hal.inria.fr/hal-02351794/file/HAL-version.pdf
https://hal.inria.fr/hal-02351794/file/HAL-version.pdf
Publikováno v:
HAL
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::78c399d903912610f4d69676f7cde6d5
https://hal.inria.fr/hal-03255844
https://hal.inria.fr/hal-03255844
Publikováno v:
Blood Weekly; 12/5/2024, p528-528, 1p
Autor:
BRADBURY, MATTHEW, JHUMKA, ARSHAD, WATSON, TIM, FLORES, DENYS, BURTON, JONATHAN, BUTLER, MATTHEW
Publikováno v:
ACM Transactions on Sensor Networks; Apr2022, Vol. 18 Issue 2, p1-41, 41p