CLASSIFICATION OF ATTACKS ON EMBEDDED SYSTEMS
暂无分享,去创建一个
M'hammed Ziane | Abdelmalek Azizi | Mostafa Azizi | Noura Ouerdi | M. Azizi | A. Azizi | M. Ziane | Noura Ouerdi
[1] Wolfgang Müller,et al. Systematic Model-in-the-Loop Test of Embedded Control Systems , 2009, IESS.
[2] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[3] Anas Abou El Kalam,et al. Defining categories to select representative attack test-cases , 2007, QoP '07.
[4] Marc J. Balcer,et al. The category-partition method for specifying and generating fuctional tests , 1988, CACM.
[5] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[6] Qijun Gu,et al. A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..
[7] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[8] Matthias Grochtmann,et al. Classification trees for partition testing , 1993, Softw. Test. Verification Reliab..
[9] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[10] Joe Grand,et al. Practical Secure Hardware Design for Embedded Systems , 2004 .
[11] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[12] W. Müller,et al. Systematic Model-inthe-Loop Test of Embedded Control Systems , 2009 .
[13] Matthias Grochtmann,et al. Test Case Design Using Classification Trees and the Classification-Tree Editor CTE , 1995 .