Cybersecurity issues in robotics
暂无分享,去创建一个
[1] Nancy M. Amato,et al. A Roadmap for US Robotics - From Internet to Robotics 2020 Edition , 2021, Found. Trends Robotics.
[2] N. G. Hockstein,et al. A history of robots: from science fiction to surgical robotics , 2007, Journal of robotic surgery.
[3] Carlos Balaguer,et al. Cryptobotics: Why Robots Need Cyber Safety , 2015, Front. Robot. AI.
[4] Ahmad-Reza Sadeghi,et al. C-FLAT: Control-Flow Attestation for Embedded Systems Software , 2016, CCS.
[5] Patrick C. Hickey,et al. TrackOS: A Security-Aware Real-Time Operating System , 2016, RV.
[6] Levente Buttyán,et al. Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[7] Haytham Elmiligi,et al. Multi-dimensional analysis of embedded systems security , 2016, Microprocess. Microsystems.
[8] Antonio Bicchi,et al. An atlas of physical human-robot interaction , 2008 .
[9] Birgit Graf,et al. Robotic home assistant Care-O-bot: past-present-future , 2002, Proceedings. 11th IEEE International Workshop on Robot and Human Interactive Communication.
[10] Nicholas S. Kelley,et al. How resilient is the United States’ food system to pandemics? , 2015, Journal of Environmental Studies and Sciences.
[11] Gang Wang,et al. Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[13] Martin Ford,et al. Rise of the robots : technology and the threat of a jobless future , 2015 .
[14] Simha Sethumadhavan,et al. Tamper Evident Microprocessors , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] Arjen K. Lenstra,et al. Security Observance throughout the Life-Cycle of Embedded Systems , 2008, ESA.
[16] Peter Frase. Class Struggle in Robot Utopia , 2016 .
[17] Thomas Frey. Hi, I'm a robot and I'm here to take your job. , 2013, Journal of environmental health.
[18] Swarup Bhunia,et al. Software exploitable hardware Trojans in embedded processor , 2012, 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT).
[19] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[20] Bill Canis,et al. The Motor Vehicle Supply Chain: Effects of the Japanese Earthquake and Tsunami , 2011 .