embedded systems IoT energy efficiency machine learning artificial intelligence intrusion detection computer networks
intrusion resilience intrusion detection intrusion prevention vehicular networks CAN byzantine fault tolerance embedded systems vehicular software
Opportunities
intrusion tolerance fault tolerance trusted execution environments Data Privacy intrusion detection software verification