Managing the security-energy tradeoff in distributed cyber-physical systems
暂无分享,去创建一个
[1] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[2] Lui Sha,et al. Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[3] Igor Nai Fovino,et al. Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.
[4] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[5] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[6] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[7] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[8] Marko Wolf,et al. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.
[9] Feng Xia,et al. Network QoS Management in Cyber-Physical Systems , 2008, 2008 International Conference on Embedded Software and Systems Symposia.
[10] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[11] A. B. Kahn,et al. Topological sorting of large networks , 1962, CACM.
[12] Vuk Lesi,et al. Security-Aware Scheduling of Embedded Control Tasks , 2017, ACM Trans. Embed. Comput. Syst..