Dynamic security management for real-time embedded applications in industrial networks
暂无分享,去创建一个
Nan Sang | Wei Jiang | Yue Ma | Ziguo Zhong
[1] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[2] Frank Mueller,et al. Feedback EDF scheduling exploiting dynamic voltage scaling , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..
[3] Nan Sang,et al. An Adaptive Risk Control and Security Management for Embedded Real-Time System , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[4] Henning Schulzrinne,et al. Peer-to-peer overlays for real-time communication: security issues and solutions , 2009, IEEE Communications Surveys & Tutorials.
[5] Chenyang Lu,et al. Feedback performance control in software services , 2003 .
[6] Mohammed I. Alghamdi,et al. Improving Security of Real-Time Wireless Networks Through Packet Scheduling [Transactions Letters] , 2008, IEEE Transactions on Wireless Communications.
[7] Rabi N. Mahapatra,et al. Feedback-controlled reliability-aware power management for real-time embedded systems , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[8] Chenyang Lu,et al. Feedback Thermal Control for Real-time Systems , 2010, 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium.
[9] Peng Ning,et al. A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid , 2011, IEEE Transactions on Smart Grid.
[10] Chung Laung Liu,et al. Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.
[11] Petru Eles,et al. Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Shanshan Song,et al. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling , 2006, IEEE Transactions on Computers.
[13] Anand Sivasubramaniam,et al. Storage Performance Virtualization via Throughput and Latency Control , 2005, MASCOTS.
[14] Ashish Gehani,et al. RheoStat: Real-Time Risk Management , 2004, RAID.
[15] Zdravko Karakehayov,et al. Wireless ad hoc networks: Where security, real-time and lifetime meet , 2008, IMCSIT.
[16] Chenyang Lu,et al. Feedback utilization control in distributed real-time systems with end-to-end tasks , 2005, IEEE Transactions on Parallel and Distributed Systems.
[17] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[18] Catherine H. Gebotys. Low energy security optimization in embedded cryptographic systems , 2004, CODES+ISSS '04.
[19] R. Zurawski. Networked embedded systems in industrial automation , 2008, 2008 6th IEEE International Conference on Industrial Informatics.
[20] Sang Hyuk Son,et al. Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms* , 2001, Real-Time Systems.
[21] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[22] Xiao Qin,et al. Scheduling security-critical real-time applications on clusters , 2006, IEEE Transactions on Computers.