메뉴 건너뛰기




Volumn , Issue , 2010, Pages 109-118

Time-based intrusion detection in cyber-physical systems

Author keywords

cyber physical systems; real time systems; security; timing analysis

Indexed keywords

APPLICATION CODES; CODE SECTIONS; CRITICAL INFRASTRUCTURE; CRITICAL ISSUES; CYBER-PHYSICAL SYSTEMS; GRANULARITY LEVELS; OPERATING SYSTEMS; PHYSICAL WORLD; REAL-TIME EMBEDDED SYSTEMS; SCHEDULABILITY ANALYSIS; SELF CHECKING; STATIC TIMING ANALYSIS; TEMPORAL CONSTRAINTS; TIMING ANALYSIS;

EID: 77954606031     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1795194.1795210     Document Type: Conference Paper
Times cited : (102)

References (32)
  • 5
    • 77954595300 scopus 로고    scopus 로고
    • Available from
    • C-Lab. Wcet benchmarks. Available from http://www.c-lab.de/home/en/ download.html.
    • Wcet Benchmarks.
  • 12
    • 3042781457 scopus 로고    scopus 로고
    • Crossover: Online pests plaguing the offline world
    • E. Levy. Crossover: Online pests plaguing the offline world. IEEE Security and Privacy, 1(6):71-73, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.6 , pp. 71-73
    • Levy, E.1
  • 13
    • 84974687699 scopus 로고
    • Scheduling algorithms for multiprogramming in a hard-real-time environment
    • Jan.
    • C. Liu and J. Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. of the Association for Computing Machinery, 20(1):46-61, Jan. 1973.
    • (1973) J. of the Association for Computing Machinery , vol.20 , Issue.1 , pp. 46-61
    • Liu, C.1    Layland, J.2
  • 15
    • 84879352073 scopus 로고    scopus 로고
    • Parascale: Expoliting parametric timing analysis for real-time schedulers and dynamic voltage scaling
    • Dec.
    • S. Mohan, F. Mueller, W. Hawkins, M. Root, C. Healy, and D. Whalley. Parascale: Expoliting parametric timing analysis for real-time schedulers and dynamic voltage scaling. In IEEE Real-Time Systems Symposium, pages 233-242, Dec. 2005.
    • (2005) IEEE Real-Time Systems Symposium , pp. 233-242
    • Mohan, S.1    Mueller, F.2    Hawkins, W.3    Root, M.4    Healy, C.5    Whalley, D.6
  • 18
    • 0033732401 scopus 로고    scopus 로고
    • Timing analysis for instruction caches
    • May
    • F. Mueller. Timing analysis for instruction caches. Real-Time Systems, 18(2/3):209-239, May 2000.
    • (2000) Real-Time Systems , vol.18 , Issue.2-3 , pp. 209-239
    • Mueller, F.1
  • 25
    • 0035501757 scopus 로고    scopus 로고
    • A comparison of static analysis and evolutionary testing for the verification of timing constraints
    • Nov.
    • J. Wegener and F. Mueller. A comparison of static analysis and evolutionary testing for the verification of timing constraints. Real-Time Systems, 21(3):241-268, Nov. 2001.
    • (2001) Real-Time Systems , vol.21 , Issue.3 , pp. 241-268
    • Wegener, J.1    Mueller, F.2
  • 28
    • 85029731561 scopus 로고    scopus 로고
    • A survey of attacks and countermeasures in mobile ad hoc networks
    • B. Wu, J. Chen, J. Wu, and M. Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, 30(3):103-135, 2007.
    • (2007) Wireless Network Security , vol.30 , Issue.3 , pp. 103-135
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 29
    • 33750954792 scopus 로고    scopus 로고
    • Open issues and challenges in security-aware real-time scheduling for distributed systems
    • T. Xie, X. Qin, and M. Lin. Open issues and challenges in security-aware real-time scheduling for distributed systems. Journal of Information, 6(9), 2006.
    • (2006) Journal of Information , vol.6 , pp. 9
    • Xie, T.1    Qin, X.2    Lin, M.3
  • 32
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networking, 9(5):545-556, 2003.
    • (2003) Wireless Networking , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.