Solutions for Cyber-Physical Systems Ubiquity
暂无分享,去创建一个
Armin Krieg | Andreas Genser | Norbert Druml | Manuel Menghin | Andrea Hoeller | N. Druml | Andreas Genser | Armin Krieg | M. Menghin | Andreas Hoeller
[1] Andreas Herkersdorf,et al. Spatial and temporal isolation of virtual CAN controllers , 2014, SIGBED.
[2] Henrik Theiling,et al. Multicore in Real-Time Systems – Temporal Isolation Challenges due to Shared Resources , 2013, DATE 2013.
[3] Michael Jacobs. Improving the Precision of Approximations in WCET Analysis for Multi-Core Processors , 2013 .
[4] Lui Raymond Sha. Resilient mixed-criticality systems , 2009 .
[5] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[6] Giuseppe Lettieri,et al. VALE, a switched ethernet for virtual machines , 2012, CoNEXT '12.
[7] Klara Nahrstedt,et al. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.
[8] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[9] Amey Vinayak Moholkar. Security for Cyber-Physical Systems , 2014 .
[10] Selma Saidi,et al. A mixed critical memory controller using bank privatization and fixed priority scheduling , 2014, 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications.
[11] Marco Pistore,et al. NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.
[12] Daqiang Zhang,et al. Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions , 2014, IEEE Communications Magazine.
[13] Hiren D. Patel,et al. Criticality- and Requirement-Aware Bus Arbitration for Multi-Core Mixed Criticality Systems , 2016, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
[14] Christian Prehofer,et al. embSFI: An Approach for Software Fault Isolation in Embedded Systems , 2016 .
[15] Shufu Mao,et al. Hardware Support for Secure Processing in Embedded Systems , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[16] Don Marti,et al. OSv - Optimizing the Operating System for Virtual Machines , 2014, USENIX Annual Technical Conference.
[17] Lui Sha,et al. Handling mixed-criticality in SoC-based real-time embedded systems , 2009, EMSOFT '09.
[18] Ramin Yahyapour,et al. Cloud computing networking: challenges and opportunities for innovations , 2013, IEEE Communications Magazine.
[19] George Kornaros,et al. Towards Trusted Apps platforms for open CPS , 2016, 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC).
[20] Miltos D. Grammatikakis,et al. Hardware Support for Cost-Effective System-Level Protection in Multi-core SoCs , 2015, 2015 Euromicro Conference on Digital System Design.
[21] Peter Honeyman,et al. A brief chronology of medical device security , 2016, Commun. ACM.
[22] George Kornaros,et al. TAPPS - Trusted Apps for Open Cyber-Physical Systems , 2015, e-Democracy.
[23] Björn B. Brandenburg. A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems , 2014, 2014 IEEE Real-Time Systems Symposium.
[24] Zaid Al-Ars,et al. Accurate and efficient identification of worst-case execution time for multicore processors: A survey , 2013, 2013 8th IEEE Design and Test Symposium.
[25] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[26] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[27] Daniel Raho,et al. Turning an open source project into a carrier grade vswitch for NFV: Vosyswitch challenges & results , 2016, 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC).
[28] Kenneth L. McMillan,et al. Symbolic model checking , 1992 .
[29] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[30] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[31] Miodrag Potkonjak,et al. Trusted sensors and remote sensing , 2010, 2010 IEEE Sensors.
[32] Henrik Theiling,et al. Multi-core Interference-Sensitive WCET Analysis Leveraging Runtime Resource Capacity Enforcement , 2014, 2014 26th Euromicro Conference on Real-Time Systems.
[33] Andreas Herkersdorf,et al. Performance Isolation Exposure in Virtualized Platforms with PCI Passthrough I/O Sharing , 2014, ARCS.
[34] Rusty Russell,et al. virtio: towards a de-facto standard for virtual I/O devices , 2008, OPSR.
[35] Sanjoy K. Baruah,et al. Mixed-Criticality Real-Time Scheduling for Multicore Systems , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[36] Frank Mueller,et al. Intrusion Detection for CPS Real-Time Controllers , 2015 .
[37] André Weimerskirch. V2V Communication Security: A Privacy Preserving Design for 300 Million Vehicles , 2014 .
[38] Brent Byunghoon Kang,et al. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment , 2015, NDSS.