Coexistence of safety and security: Synchronized redundant system with security enhancements

[1]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[2]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[3]  Kai T. Hansen,et al.  Security attack analysis of safety systems , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.

[4]  Juan E. Tapiador,et al.  Anomaly detection methods in wired networks: a survey and taxonomy , 2004, Comput. Commun..

[5]  Mohammad Abdollahi Azgomi,et al.  A majority voter for intrusion tolerant software based on N-version programming techniques , 2009, 2009 International Conference on Innovations in Information Technology (IIT).

[6]  Javier Del Ser,et al.  Synchronization of faulty processors in coarse-grained TMR protected partially reconfigurable FPGA designs , 2016, Reliab. Eng. Syst. Saf..

[7]  Stuart Bennett,et al.  A taxonomy for software voting algorithms used in safety-critical systems , 2004, IEEE Transactions on Reliability.

[8]  Yasser Sedaghat,et al.  A confidence-based software voter for safety-critical systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[9]  C. Preschern,et al.  Built-in security enhancements for the 1oo2 safety architecture , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[10]  Fabrizio Lombardi,et al.  An approximate voting scheme for reliable computing , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[11]  Luca Ferrarini,et al.  Analysis of Ethernet-based safe automation networks according to IEC 61508 , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.