Safety and Liveness of Software Rejuvenation for Secure Tracking Control
暂无分享,去创建一个
[1] Domenico Cotroneo,et al. A survey of software aging and rejuvenation studies , 2014, ACM J. Emerg. Technol. Comput. Syst..
[2] Sagar Chaki,et al. überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor , 2016, USENIX Security Symposium.
[3] Marco Caccamo,et al. Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[4] W. Marsden. I and J , 2012 .
[5] Franco Blanchini,et al. Set invariance in control , 1999, Autom..
[6] Bruno Sinopoli,et al. Design of Software Rejuvenation for CPS Security Using Invariant Sets , 2018, 2019 American Control Conference (ACC).
[7] Yennun Huang,et al. Software rejuvenation: analysis, module and applications , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[8] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[9] Jong Sou Park,et al. Software Rejuvenation Approach to Security Engineering , 2004, ICCSA.
[10] Kishor S. Trivedi,et al. Software Rejuvenation: Do IT & Telco Industries Use It? , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.
[11] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[12] Chen-Yu Lee,et al. Security Through Software Rejuvenation , 2014, ICSEA 2014.
[13] R. Beard. Quadrotor Dynamics and Control , 2008 .
[14] E. Yaz. Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.
[15] Marco Caccamo,et al. Preserving Physical Safety Under Cyber Attacks , 2019, IEEE Internet of Things Journal.
[16] Stephen P. Boyd,et al. Linear Matrix Inequalities in Systems and Control Theory , 1994 .