**Author details**

Khattab M. Ali Alheeti1 \*, Duaa Al\_Dosary2 and Salah Sleibi Al-Rawi3

1 Computer Networking Systems Department, College of Computer Sciences and Information Technology, University of Anbar, Iraq

2 Computer Sciences Department, College of Computer Sciences and Information Technology, University of Anbar, Iraq

3 Information Systems Department, College of Computer Sciences and Information Technology, University of Anbar, Iraq

\*Address all correspondence to: co.khattab.alheeti@uoanbar.edu.iq

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**107**

pp. 44-49

2014;**2**:11-17

*Embedded Devices Security Based on ICMetric Technology*

*DOI: http://dx.doi.org/10.5772/intechopen.89240*

[1] Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Prentice Hall; 2011

[2] Alshahrani M, Teymourlouei H. Network security: Threats and vulnerabilities. In: International Conference on Security and Management. CSREA Press; 2016.

[3] Lizarraga J, et al. Security in embedded systems. In: IADIS International Conference Applied Computing; 2006. pp. 697-699

[4] Tahir H, Mcdonald-maier K. Securing health sensing using integrated circuit metric. Sensors. 2015;**2015**(15):26621-26642

[5] Ali KM. Intrusion detection system in external communication for selfdriving vehicles [PHD thesis]. School of Computer Science and Electronic Engineering, University of Essex; 2017

[6] Faria B, Mónica S, Vasconcelos L, Reis P, Lau N. A methodology for creating intelligent wheelchair users' profiles. In: ICAART 2012—Proceedings of the 4th International Conference on Agents and Artificial Intelligence. 2012 SCITEPRESS (Science and Technology Publications). Vol. 1. 2012. pp. 171-179

[7] Tahir H, Tahir R, Mcdonald-maier K. Securing MEMS based sensor nodes in the internet of things. In: 2015 Sixth International Conference on Emerging Security Technologies Securing; 2015.

[8] Kumar G. Evaluation metrics for intrusion detection systems—A study. International Journal of Computer Science and Mobile Applications.

pp. 115-121

**References**

*Embedded Devices Security Based on ICMetric Technology DOI: http://dx.doi.org/10.5772/intechopen.89240*
