Development of a Novel Automotive Cybersecurity, Integrity Level, Framework
暂无分享,去创建一个
Balázs Sághi | Zsolt Szalay | Árpád Török | Z. Szalay | Á. Török | B. Sághi
[1] Youcef Gheraibia,et al. Ant colony algorithm for automotive safety integrity level allocation , 2018, Applied Intelligence.
[2] Christoph Schmittner,et al. Integration of Security in the Development Lifecycle of Dependable Automotive CPS , 2021, Research Anthology on Artificial Intelligence Applications in Security.
[3] Ching-Te Chiu,et al. Assessing automotive functional safety microprocessor with ISO 26262 hardware requirements , 2014, Technical Papers of 2014 International Symposium on VLSI Design, Automation and Test.
[4] Peter Krebs,et al. The Shell Model - A Method for System Boundary Analysis , 2018, EuroSPI.
[5] Lionel C. Briand,et al. Using Machine Learning to Support Debugging with Tarantula , 2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07).
[6] Jeremy Bryans,et al. Building an automotive security assurance case using systematic security evaluations , 2018, Comput. Secur..
[7] Christian Kreiner,et al. Effective Approaches to Training CPS Knowledge and Skills , 2017 .
[8] Mohamed-Slim Alouini,et al. FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks , 2016, IEEE Communications Magazine.
[9] Jérémie Guiochet,et al. Safety-critical advanced robots: A survey , 2017, Robotics Auton. Syst..
[10] Grzegorz Kaczor,et al. Verification of safety integrity level with the application of Monte Carlo simulation and reliability block diagrams , 2016 .
[11] M. Bellotti,et al. How future automotive functional safety requirements will impact microprocessors design , 2010, Microelectron. Reliab..
[12] Ridha Khédri,et al. Mitigating covert channels based on analysis of the potential for communication , 2016, Theor. Comput. Sci..
[13] Vicente Matellán Olivera,et al. Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots , 2017, Comput. Secur..
[14] Lior Rokach,et al. Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2018, ArXiv.
[15] Martin Newby,et al. Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems , 2013, 2013 European Intelligence and Security Informatics Conference.
[16] István Varga,et al. Development of a Test Track for Driverless Cars: Vehicle Design, Track Configuration, and Liability Considerations , 2017 .
[17] Tímea Fülep. Design methods of safety-critical systems and their application in electronic brake systems , 2007 .
[18] Justin Kassie,et al. Assessing and Computing the Safety Integrity Level (SIL) for Turbo Machinery Protection , 2017 .
[19] Ricardo Neisse,et al. Ethical Design in the Internet of Things , 2016, Science and Engineering Ethics.