Showing 25 - 32 of 60
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military Embedded Systems

Making CMOSS Deployable: The Rubber Hits The Road

The suite of open architecture industry and U.S. Army standards included in CMOSS enables the reduction of C4ISR system SWaP.

11/26/2019
article

Managing Next-Generation Open Standard Vehicle Electronics Architectures

Newer on-vehicle integrated networks will be composed of heterogeneous networks in the form of software and equipment from multiple commercial vendors.

10/02/2019
Military & Aerospace Electronics

Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options

The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.

08/21/2019
Curtiss-Wright Showcases its Open Systems Architecture Ground Vehicle Solutions at GVSETS 2019

Curtiss-Wright Showcases its Open Systems Architecture Ground Vehicle Solutions at GVSETS 2019

Curtiss-Wright, in collaboration with PacStar, will present a paper on “Managing Next Generation Open Standard Vehicle Electronics Architectures”.

08/13/2019
Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks

Curtiss-Wright and PacStar Collaborate to Demo Single Pane of Glass Dashboard for Management of VICTORY Networks

The demo features PacStar’s IQ-Core Software network management software running on Curtiss-Wright rugged mission computers.

08/13/2019
SAE MOBILUS

New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders

Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.

05/17/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019