Research and Development Priorities for Security of Embedded Hardware Devices
Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of...
Saved in:
Published in | IEEE transactions on engineering management Vol. 71; pp. 2800 - 2811 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0018-9391 1558-0040 |
DOI | 10.1109/TEM.2022.3197240 |
Cover
Abstract | Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is vital to maintain and enhance system trust and security. This article develops a framework to address initiatives and success criteria which accounts for different perspectives of system stakeholders and identify different potential emergent conditions and scenarios which are most and least impactful to the trust and security of the supply chain. The article demonstrates a research and development priorities preferences method that accounts for evolving perspectives of supply chain stakeholders and describing the example application of embedded hardware devices as a system. |
---|---|
AbstractList | Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include counterfeit parts, cyber-attacks, Trojan attacks, reliance on offshore-manufactured and controlled hardware, software, and rapid increase of network technologies. Addressing these threats is vital to maintain and enhance system trust and security. This article develops a framework to address initiatives and success criteria which accounts for different perspectives of system stakeholders and identify different potential emergent conditions and scenarios which are most and least impactful to the trust and security of the supply chain. The article demonstrates a research and development priorities preferences method that accounts for evolving perspectives of supply chain stakeholders and describing the example application of embedded hardware devices as a system. |
Author | Luu, Mai Manasco, Mark C. Moghadasi, Negin Adekunle, Rahman O. Polmateer, Thomas L. Lambert, James H. Emmert, John M. |
Author_xml | – sequence: 1 givenname: Negin orcidid: 0000-0003-0475-8233 surname: Moghadasi fullname: Moghadasi, Negin email: nm2fs@virginia.edu organization: Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, USA – sequence: 2 givenname: Mai surname: Luu fullname: Luu, Mai email: ml9hq@virginia.edu organization: Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, USA – sequence: 3 givenname: Rahman O. surname: Adekunle fullname: Adekunle, Rahman O. email: aa3mf@virginia.edu organization: Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, USA – sequence: 4 givenname: Thomas L. orcidid: 0000-0003-1034-6980 surname: Polmateer fullname: Polmateer, Thomas L. email: tp3qh@virginia.edu organization: Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, USA – sequence: 5 givenname: Mark C. surname: Manasco fullname: Manasco, Mark C. email: mark.manasco@ccals.com organization: Commonwealth Center for Advanced Logistics Systems, Richmond, VA, USA – sequence: 6 givenname: John M. orcidid: 0000-0002-6074-535X surname: Emmert fullname: Emmert, John M. email: emmertj@ucmail.uc.edu organization: Department of Electrical Engineering and Computer Science, University of Cincinnati, Cincinnati, OH, USA – sequence: 7 givenname: James H. orcidid: 0000-0002-0697-8339 surname: Lambert fullname: Lambert, James H. email: lambert@virginia.edu organization: Department of Engineering Systems and Environment, University of Virginia, Charlottesville, VA, USA |
BookMark | eNp9kEFLAzEQhYNUsFbvgpcFz1sn2d00OUqtVmhRtJ5DNpnFlHZTk63Sf29KiwcPnmbe8L558M5Jr_UtEnJFYUgpyNvFZD5kwNiwoHLESjghfVpVIgcooUf6AFTkspD0jJzHuEyyrBj0yfwVI-pgPjLd2uwev3DlN2tsu-wlOB9c5zBmjQ_ZG5ptkrvMN9lkXaO1aLOpDvZbB9yDzmC8IKeNXkW8PM4BeX-YLMbTfPb8-DS-m-WmKEWXj9CC5sZSPhKS142uucVGiBpKXqNIG7WWYc1LmS4VTWGshqYWlnHbGFYMyM3h7yb4zy3GTi39NrQpUjFJaSlkCUVywcFlgo8xYKM2wa112CkKal-aSqWpfWnqWFpC-B_EuE53zrdd0G71H3h9AB0i_uZIwbkYVcUPsG572Q |
CODEN | IEEMA4 |
CitedBy_id | crossref_primary_10_1002_iis2_13167 crossref_primary_10_1109_JIOT_2025_3528744 crossref_primary_10_1007_s10669_024_09967_w crossref_primary_10_1002_iis2_13049 crossref_primary_10_1061_NHREFO_NHENG_1970 |
Cites_doi | 10.3389/fpsyg.2014.00186 10.1109/TEM.2018.2798408 10.1109/JSYST.2018.2812864 10.1109/confluence.2019.8776950 10.1016/j.ress.2020.107308 10.1061/(asce)is.1943-555x.0000078 10.1061/ajrua6.0000962 10.1109/TEM.2020.2971858 10.4028/www.scientific.net/KEM.584.298 10.1002/qre.2607 10.1109/TCAD.2020.3047976 10.1016/j.dss.2012.08.001 10.1016/j.ocecoaman.2019.105000 10.1287/mnsc.48.8.1008.163 10.1139/cjce-2020-0089 10.1016/j.ijproman.2007.08.005 10.1016/j.ress.2019.106775 10.1109/mitp.2019.2895423 10.1109/icsict49897.2020.9278162 10.1007/s11051-007-9211-0 10.1002/mcda.403 10.1007/978-1-4615-1495-4 10.1109/TEM.2019.2925057 10.1002/ieam.137 10.1109/SYSCON.2011.5929131 10.1016/j.ejor.2012.04.038 10.1016/j.scitotenv.2011.06.022 10.1002/sys.21298 10.1002/qre.2597 10.1109/isc251055.2020.9239061 10.3390/electronics9111864 10.1002/sys.21471 10.1111/risa.12711 10.1016/j.ecolind.2012.10.005 10.1109/icces48766.2020.9138013 10.1016/j.ress.2022.108565 10.1007/978-3-540-92828-7_2 10.1016/j.technovation.2010.07.003 10.1061/(ASCE)IS.1943-555X.0000133 10.1109/MC.2013.448 10.1109/bigdata50022.2020.9377825 10.1109/EMR.2002.1032403 10.1109/TEM.2020.2978014 10.1002/sys.21215 10.1109/TEM.2019.2908037 10.22190/fume210130048k 10.1109/tem.2021.3133104 10.1061/ajrua6.0000961 10.1016/j.ress.2021.107679 10.1109/tem.2021.3103318 10.1016/j.gloenvcha.2006.11.006 10.1108/09574091211289200 10.1021/es100959q 10.1080/00207543.2015.1030467 10.1897/IEAM_2004a-015.1 10.1109/sss47320.2020.9174365 10.1109/SYSCON.2016.7490639 10.1109/SYSCON.2016.7490594 10.1109/TSMCA.2010.2055154 10.1109/spw50608.2020.00038 10.1109/tem.2021.3053655 10.1109/dasa51403.2020.9317024 10.1109/ojcs.2020.3025313 10.7249/rb9835 10.1287/mnsc.47.1.85.10661 10.1007/s10836-013-5428-2 10.1016/j.psychsport.2021.101887 10.1109/CONIITI48476.2019.8960909 10.1061/ajrua6.0000814 10.1016/S0166-4972(00)00026-2 10.1109/access.2021.3058338 10.7249/MR1626 10.1504/IJRAM.2011.042120 10.1007/s10669-014-9525-2 10.1109/tem.2021.3128192 10.1002/9781119287490.ch1 10.1109/TDSC.2018.2812183 10.3390/jsan8030042 10.1108/JGOSS-05-2019-0042 10.1016/j.ress.2019.05.001 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1109/TEM.2022.3197240 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0040 |
EndPage | 2811 |
ExternalDocumentID | 10_1109_TEM_2022_3197240 9866875 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Science Foundation grantid: 1916760 funderid: 10.13039/501100008982 – fundername: Center for Hardware and Embedded Systems Security and Trust |
GroupedDBID | -~X .-4 .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACGOD ACHQT ACIWK ACNCT ADMHC AENEX AETIX AFOGA AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS TAE TN5 VH1 AAYOK AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c348t-7ed0a6cd167896bfab6def88b046be8f881dd2eb64904651edd2b0fb8d26dfc23 |
IEDL.DBID | RIE |
ISSN | 0018-9391 |
IngestDate | Sun Jun 29 15:33:21 EDT 2025 Tue Jul 01 02:22:45 EDT 2025 Thu Apr 24 23:06:11 EDT 2025 Wed Aug 27 02:37:22 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c348t-7ed0a6cd167896bfab6def88b046be8f881dd2eb64904651edd2b0fb8d26dfc23 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0475-8233 0000-0002-0697-8339 0000-0003-1034-6980 0000-0002-6074-535X |
PQID | 2911489403 |
PQPubID | 4949 |
PageCount | 12 |
ParticipantIDs | proquest_journals_2911489403 crossref_primary_10_1109_TEM_2022_3197240 crossref_citationtrail_10_1109_TEM_2022_3197240 ieee_primary_9866875 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20240000 2024-00-00 20240101 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – year: 2024 text: 20240000 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on engineering management |
PublicationTitleAbbrev | TEM |
PublicationYear | 2024 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 (ref23) 2021 ref57 ref12 ref56 ref15 ref59 ref14 ref58 ref53 ref52 ref55 ref10 ref54 ref17 ref16 ref19 ref18 ref93 ref92 ref51 ref50 Collier (ref11) ref91 ref90 ref46 ref45 ref89 ref48 ref47 ref42 ref86 ref41 ref85 ref44 ref88 ref43 ref87 Luppino (ref62) 2014; 19 ref49 Glen (ref26) 2022 ref8 ref9 ref4 ref3 ref6 ref5 ref40 ref84 ref80 Ogilvy (ref68) 2014 ref35 ref79 ref34 ref78 ref37 ref36 (ref81) 2021 ref31 ref30 ref74 ref33 ref77 ref32 ref76 (ref7) 2016 ref2 ref1 Shin (ref75) 2018; 10 ref71 ref70 Imran (ref38) 2021 ref73 ref72 ref24 Sperling (ref82) 2020 ref67 ref25 ref69 ref20 ref64 ref63 Josh (ref39) 2020 ref66 ref21 Emmert (ref22) 2022 ref65 ref28 ref27 ref29 (ref83) 2020 ref60 ref61 |
References_xml | – ident: ref6 doi: 10.3389/fpsyg.2014.00186 – ident: ref77 doi: 10.1109/TEM.2018.2798408 – ident: ref9 doi: 10.1109/JSYST.2018.2812864 – ident: ref45 doi: 10.1109/confluence.2019.8776950 – ident: ref40 doi: 10.1016/j.ress.2020.107308 – ident: ref54 doi: 10.1061/(asce)is.1943-555x.0000078 – ident: ref1 doi: 10.1061/ajrua6.0000962 – year: 2020 ident: ref39 article-title: Top cybersecurity facts, figures and statistics – ident: ref20 doi: 10.1109/TEM.2020.2971858 – ident: ref59 doi: 10.4028/www.scientific.net/KEM.584.298 – ident: ref16 doi: 10.1002/qre.2607 – ident: ref34 doi: 10.1109/TCAD.2020.3047976 – ident: ref61 doi: 10.1016/j.dss.2012.08.001 – ident: ref64 doi: 10.1016/j.ocecoaman.2019.105000 – ident: ref73 doi: 10.1287/mnsc.48.8.1008.163 – ident: ref87 doi: 10.1139/cjce-2020-0089 – ident: ref72 doi: 10.1016/j.ijproman.2007.08.005 – ident: ref31 doi: 10.1016/j.ress.2019.106775 – ident: ref52 doi: 10.1109/mitp.2019.2895423 – volume: 10 year: 2018 ident: ref75 article-title: Identification and prioritization of risk factors in R&D projects based on an R&D process model publication-title: MDPI J. – ident: ref88 doi: 10.1109/icsict49897.2020.9278162 – ident: ref58 doi: 10.1007/s11051-007-9211-0 – ident: ref67 doi: 10.1002/mcda.403 – ident: ref4 doi: 10.1007/978-1-4615-1495-4 – ident: ref93 doi: 10.1109/TEM.2019.2925057 – ident: ref44 doi: 10.1002/ieam.137 – ident: ref55 doi: 10.1109/SYSCON.2011.5929131 – ident: ref21 doi: 10.1016/j.ejor.2012.04.038 – ident: ref36 doi: 10.1016/j.scitotenv.2011.06.022 – year: 2022 ident: ref22 article-title: Chest industrial advisory board (IAB). NSF CHEST CHEST industrial advisory board page – ident: ref13 doi: 10.1002/sys.21298 – year: 2021 ident: ref23 article-title: The White House – ident: ref89 doi: 10.1002/qre.2597 – start-page: 1 volume-title: Proc. 20th Int. Command Control Res. Technol. Symp. ident: ref11 article-title: Building a trusted and agile supply chain network for electronic hardware – ident: ref35 doi: 10.1109/isc251055.2020.9239061 – ident: ref80 doi: 10.3390/electronics9111864 – ident: ref85 doi: 10.1002/sys.21471 – ident: ref86 doi: 10.1111/risa.12711 – ident: ref15 doi: 10.1016/j.ecolind.2012.10.005 – ident: ref53 doi: 10.1109/icces48766.2020.9138013 – ident: ref65 doi: 10.1016/j.ress.2022.108565 – ident: ref66 doi: 10.1007/978-3-540-92828-7_2 – ident: ref91 doi: 10.1016/j.technovation.2010.07.003 – ident: ref30 doi: 10.1061/(ASCE)IS.1943-555X.0000133 – volume-title: Planning Your Scenarios year: 2014 ident: ref68 – ident: ref12 doi: 10.1109/MC.2013.448 – ident: ref17 doi: 10.1109/bigdata50022.2020.9377825 – ident: ref18 doi: 10.1109/EMR.2002.1032403 – ident: ref60 doi: 10.1109/TEM.2020.2978014 – ident: ref43 doi: 10.1002/sys.21215 – year: 2020 ident: ref83 article-title: Supply chain risk management: Reducing threats to key u.s supply chains – ident: ref46 doi: 10.1109/TEM.2019.2908037 – ident: ref51 doi: 10.22190/fume210130048k – ident: ref69 doi: 10.1109/tem.2021.3133104 – ident: ref8 doi: 10.1061/ajrua6.0000961 – ident: ref49 doi: 10.1016/j.ress.2021.107679 – ident: ref50 doi: 10.1109/tem.2021.3103318 – ident: ref27 doi: 10.1016/j.gloenvcha.2006.11.006 – volume-title: Semiconductor Engineering year: 2020 ident: ref82 article-title: Security risks in the supply chain – ident: ref25 doi: 10.1108/09574091211289200 – ident: ref57 doi: 10.1021/es100959q – ident: ref32 doi: 10.1080/00207543.2015.1030467 – ident: ref48 doi: 10.1897/IEAM_2004a-015.1 – ident: ref63 doi: 10.1109/sss47320.2020.9174365 – ident: ref10 doi: 10.1109/SYSCON.2016.7490639 – ident: ref14 doi: 10.1109/SYSCON.2016.7490594 – ident: ref41 doi: 10.1109/TSMCA.2010.2055154 – ident: ref79 doi: 10.1109/spw50608.2020.00038 – year: 2021 ident: ref38 article-title: The role of industry 4.0 technologies in supply chain risk mitigation: Empirical evidence from the food processing industry publication-title: IEEE Trans. Eng. Manage. – ident: ref2 doi: 10.1109/tem.2021.3053655 – ident: ref33 doi: 10.1109/dasa51403.2020.9317024 – ident: ref74 doi: 10.1109/ojcs.2020.3025313 – ident: ref78 doi: 10.7249/rb9835 – ident: ref37 doi: 10.1287/mnsc.47.1.85.10661 – ident: ref28 doi: 10.1007/s10836-013-5428-2 – ident: ref92 doi: 10.1016/j.psychsport.2021.101887 – volume-title: StatisticsHowTo.com: Elementary Statistics For the Rest of Us year: 2022 ident: ref26 article-title: Spearman rank correlation (Spearmans RHO): Definition and how to calculate it – ident: ref5 doi: 10.1109/CONIITI48476.2019.8960909 – year: 2021 ident: ref81 article-title: Software supply chain attacks – ident: ref29 doi: 10.1061/ajrua6.0000814 – ident: ref19 doi: 10.1016/S0166-4972(00)00026-2 – ident: ref47 doi: 10.1109/access.2021.3058338 – ident: ref56 doi: 10.7249/MR1626 – ident: ref42 doi: 10.1504/IJRAM.2011.042120 – year: 2016 ident: ref7 article-title: Counterfeit parts: DoD needs to improve reporting and oversight to reduce supply chain risk – ident: ref90 doi: 10.1007/s10669-014-9525-2 – ident: ref3 doi: 10.1109/tem.2021.3128192 – ident: ref84 doi: 10.1002/9781119287490.ch1 – volume: 19 start-page: 67 issue: 2 year: 2014 ident: ref62 article-title: Risk management in research and development (R&D) projects: The case of South Australia publication-title: Asian Acad. Manage. J. – ident: ref24 doi: 10.1109/TDSC.2018.2812183 – ident: ref76 doi: 10.3390/jsan8030042 – ident: ref70 doi: 10.1108/JGOSS-05-2019-0042 – ident: ref71 doi: 10.1016/j.ress.2019.05.001 |
SSID | ssj0014520 |
Score | 2.4338443 |
Snippet | Supply chains for embedded hardware devices are subject to a variety of security threats that are concerning to governments and industry. Such threats include... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2800 |
SubjectTerms | Correlation Counterfeit Cybersecurity Emergent conditions enterprise resilience Hardware Industries Investment multicriteria analysis Priorities R&D Research & development risk analysis scenario analysis Security Stakeholders Supply chains systems engineering Threats trust uncertainty |
Title | Research and Development Priorities for Security of Embedded Hardware Devices |
URI | https://ieeexplore.ieee.org/document/9866875 https://www.proquest.com/docview/2911489403 |
Volume | 71 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5qT3rwVcVqlRy8CG67m6TZzVGkpQgVwRZ6W5JNAqJ2pbYI_non-yhFRbzlkISQmcwjM_MNwCV6CI46JwLOQhNwxXiQKOMCDwYXR1ppaX298_hejKb8btafNeB6XQtjrS2Sz2zXD4tYvsmzlf8q68lECLSvt2AL2ays1VpHDHi_gmCM8AEzGdUhyVD2JoMxOoKUon8qY-q_OTZUUNFT5YcgLrTLcA_G9bnKpJLn7mqpu9nnN8jG_x58H3YrM5PclHxxAA07P4SdDfDBFozrpDui5oZsJA-Rh8VTviiQVgmatOSxanFHckcGr9qiqDLER_w_1ML6hV7WHMF0OJjcjoKquUKQMZ4sg9iaUInMRKitpNBOaWGsSxKNDrO2CY4iY6jVgsvQ90vHzakOnU4MFcZllB1Dc57P7QkQlXEnuIkZakEeM6aQK4yvsTdMZ0lI29Cr7zvNKuRx3wDjJS08kFCmSKHUUyitKNSGq_WKtxJ144-5LX_h63nVXbehU5M0rZ7le0qld_8kD9np76vOYBv35uUfSweay8XKnqPVsdQXBbt9AZd00_4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB60HtSDb7E-c_AiuO1ukmY3R5FKfawIVvC2JJsERG2ltgj-eif7KEVFvOWQ2Q2ZJPP-BuAYLQRHnRMBZ6EJuGI8SJRxgQeDiyOttLS-3jm9Fb0HfvXYeZyD02ktjLW2SD6zLT8sYvlmmE-8q6wtEyFQv56HBZT7vFNWa01jBrxTgTBGeIWZjOqgZCjb_W6KpiClaKHKmHpHx4wQKrqq_HiKC_lysQppvbIyreS5NRnrVv75DbTxv0tfg5VK0SRn5clYhzk72IDlGfjBTUjrtDuiBobMpA-Ru9HTcFRgrRJUasl91eSODB3pvmqLj5UhPub_oUbWE_rXZgseLrr9815QtVcIcsaTcRBbEyqRmwjllRTaKS2MdUmi0WTWNsFRZAy1WnAZ-o7p-HGqQ6cTQ4VxOWXb0BgMB3YHiMq5E9zEDOUgjxlTeC6Mr7I3TOdJSJvQrvc7yyvscd8C4yUrbJBQZsihzHMoqzjUhJMpxVuJu_HH3E2_4dN51V43Yb9maVZdzPeMSm8ASh6y3d-pjmCx109vspvL2-s9WML_8NLjsg-N8WhiD1AHGevD4uh9AdtN10s |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+and+Development+Priorities+for+Security+of+Embedded+Hardware+Devices&rft.jtitle=IEEE+transactions+on+engineering+management&rft.au=Moghadasi%2C+Negin&rft.au=Luu%2C+Mai&rft.au=Adekunle%2C+Rahman+O.&rft.au=Polmateer%2C+Thomas+L.&rft.date=2024&rft.pub=IEEE&rft.issn=0018-9391&rft.volume=71&rft.spage=2800&rft.epage=2811&rft_id=info:doi/10.1109%2FTEM.2022.3197240&rft.externalDocID=9866875 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9391&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9391&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9391&client=summon |