Hardware and Software Constraints for Automotive Firewall Systems
暂无分享,去创建一个
[1] Barbara J. Czerny. System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework , 2013 .
[2] André Weimerskirch,et al. Do Vehicles Need Data Security , 2011 .
[3] Marko Wolf,et al. A Systematic Approach to a Qualified Security Risk Analysis for Vehicular IT Systems , 2012, Automotive - Safety & Security.
[4] André Weimerskirch,et al. Introduction to Vehicular Embedded Security , 2009 .
[5] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[6] Karsten Schmidt,et al. Adapted Development Process for Security in Networked Automotive Systems , 2014 .
[7] Karsten Schmidt,et al. GBit Ethernet - The Solution for Future In-Vehicle Network Requirements? , 2015 .
[8] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.