
Embedded Systems Security
Cybersecurity approaches for power-constrained devices like mobile phones and IoT endpoints, including virtualization and isolation techniques for protecting embedded computing platforms.
2 episodes
Cybersecurity approaches for power-constrained devices like mobile phones and IoT endpoints, including virtualization and isolation techniques for protecting embedded computing platforms.
2 episodes