Computer Science ›› 2025, Vol. 52 ›› Issue (4): 33-39.doi: 10.11896/jsjkx.241100020
• Smart Embedded Systems • Previous Articles Next Articles
HE Ruiqi1, ZHANG Kailong1, WU Jinfei1, YU Qiang2, ZHANG Jiaming1
CLC Number:
[1]PINTO R,TORRES P M B,LOHWEG V.Closing editorial:Advances and future directions in autonomous systems for cyber-physical systems and smart industry[J].Applied Sciences,2024,14(22):10673. [2]SINGH J,SINGH A,SINGH H,et al.Implementation and evaluation of a smart machine monitoring system under industry 4.0 concept[J].Journal of Industrial Information Integration,2025,43:100746. [3]CHANDRA S,SAMUEL M,EUGENE V E,et al.Review of the security of backward-compatible automotive inter-ecu communication[J].IEEE Access,2021,9:114854-114869. [4]QU W,YU F H.Survey of Research on Asymmetric Embedded System Based on Multi-core Processor[J].Computer Science,2021,48(S1):538-542. [5]WANG Z.Application of Virtualization Technology in Computer Systems[J].Integrated Circuit Applications,2024,41(10):66-67. [6]ROHLIN A,FAHLGREN H,PERICÀS M.High performancescheduling of mixed-modedags on heterogeneous multicores[J].arXiv:1901.05907,2019. [7]ZHAO W F,ZHAO Y.Research on key technologies of multi-core processor systems[J].Digital Technology and Applications,2023,41(3):123-125. [8]ZHANG M Y,ZHANG Q Y,MENG Z Q.A survey of research on real-time dual-OS architecture for embedded platform[J].Acta Electronica Sinica,2018,46(11):2787-96. [9]KONG X Z.Research and Implementation of Embedded Real-time Operating System for SMP Architecture DSP[D].Xi'an:Xidian University,2013. [10]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017. [11]LI S Y.Application and development trends of virtualizationtechnology in computer network security[N].Anhui Science and Technology News,2024-10-18. [12]PENG A N,ZHOU W,JIAY,et al.Survey of the Internet of things operating system security[J].Journal on Communications,2018,39(3):22-34. [13]BABAR S,STANGO A,PRASAD N,et al.Proposed embeddedsecurity framework for Internet of things(IoT)[C]//2011 2nd International Conference on Wireless Communication,Vehicular Technology,Information Theory and Aerospace & Electronics Systems Technology(Wireless VITAE).2011:1-5. [14]JIN Y.Embedded system security in smart consumer electronics[C]//The 4th International Workshop on Trustworthy Embedded Devices.2014. [15]LIU S.Design and development of a security kernel in an embedded system[J].International Journal of Control & Automation,2014,7(11):49-58. [16]AZAB A M,SWIDOWSKI K,BHUTKAR R,et al.SKEE:alightweight secure kernel-level execution environment for ARM[C]//NDSS.2016. [17]BATES A,TIAN D,BUTLER K R B,et al.Trustworthy whole-system provenance for the Linux kernel[C]//Usenix Conference on Security Symposium.2015:319-334. [18]DYER J G,LINDEMANN M,PEREZ R,et al.Building the IBM 4758 secure coprocessor[J].Computer,2001,34(10):57-66. [19]ZHAO L,LI G,SUTTER B D,et al.ARMor:fully verified software fault isolation[C]//The International Conference on Embedded Software.2011:289-298. [20]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017. [21]OUYANG L,SONG K,LAN J L.Design and Implementation ofMicrocontroller Based on Dynamic Heterogeneous Redundancy Architecture[J].Acta Electronica Sinica,2023,20(9):144-159. |
[1] | MA Zigang, MA Rongkuan, LI Beibei, XIE Yaobin, WEI Qiang, PENG Minwei. SSPN-RA:Security Integration Risk Assessment Method for ICS Based on SS-petri Net [J]. Computer Science, 2024, 51(10): 380-390. |
[2] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[3] | . Model Development Environment Research of Embedded Real-time Software [J]. Computer Science, 2012, 39(Z11): 226-229. |
[4] | . Cluster-based Distributed Consensus Algorithms Based on Connected Dominating Set in WSN [J]. Computer Science, 2012, 39(Z11): 55-57. |
|