Showing 1 - 8 of 14
Aerospace Tech Review

High Speed Cameras for Aerospace Testing

High speed cameras are used to capture pictures of very rapid events that would be impossible to capture with normal cameras.

03/01/2023
Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

04/09/2020
Military & Aerospace Electronics

Designers of Small Rugged Computers for the Battlefield Balance Size, Performance, and Cooling

Commercial off-the-shelf (COTS) components are being embraced so the technology can be serviced at the base instead of waiting for specialized parts or sending the system back state-side.

02/03/2020
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military & Aerospace Electronics

Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options

The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.

08/21/2019
SAE MOBILUS

New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders

Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.

05/17/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019