Coexistence of safety and security: Synchronized redundant system with security enhancements
暂无分享,去创建一个
Leonardo J. Valdivia | Jaizki Mendizabal | Iñigo Adin | Saioa Arrizabalaga | Javier Añorga | J. Mendizabal | I. Adin | S. Arrizabalaga | J. Añorga
[1] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[2] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[3] Kai T. Hansen,et al. Security attack analysis of safety systems , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.
[4] Juan E. Tapiador,et al. Anomaly detection methods in wired networks: a survey and taxonomy , 2004, Comput. Commun..
[5] Mohammad Abdollahi Azgomi,et al. A majority voter for intrusion tolerant software based on N-version programming techniques , 2009, 2009 International Conference on Innovations in Information Technology (IIT).
[6] Javier Del Ser,et al. Synchronization of faulty processors in coarse-grained TMR protected partially reconfigurable FPGA designs , 2016, Reliab. Eng. Syst. Saf..
[7] Stuart Bennett,et al. A taxonomy for software voting algorithms used in safety-critical systems , 2004, IEEE Transactions on Reliability.
[8] Yasser Sedaghat,et al. A confidence-based software voter for safety-critical systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[9] C. Preschern,et al. Built-in security enhancements for the 1oo2 safety architecture , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).
[10] Fabrizio Lombardi,et al. An approximate voting scheme for reliable computing , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[11] Luca Ferrarini,et al. Analysis of Ethernet-based safe automation networks according to IEC 61508 , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.