Detection of anomalies in data for monitoring of security components in the Internet of Things
暂无分享,去创建一个
[1] Igor V. Kotenko,et al. Configuration-Based Approach to Embedded Device Security , 2012, MMM-ACNS.
[2] Kevin Fu,et al. Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.
[3] Igor V. Kotenko,et al. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components , 2012, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing.
[4] N. R. Potlapally. Topics in secure embedded system design , 2008 .
[5] Patrick Schaumont,et al. Securing embedded systems , 2006, IEEE Security & Privacy.
[6] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[7] Thomas A. Henzinger,et al. The Embedded Systems Design Challenge , 2006, FM.