-
1
-
-
21644438416
-
Communication systems for building automation and control
-
Jun
-
W. Kastner, G. Neugschwandtner, S. Soucek, and H. M. Newman, "Communication systems for building automation and control", Proc. IEEE, vol. 93, no. 6, pp. 1178-1203, Jun. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.6
, pp. 1178-1203
-
-
Kastner, W.1
Neugschwandtner, G.2
Soucek, S.3
Newman, H.M.4
-
2
-
-
10444250021
-
Life safety and security systems
-
Weinheim, Germany: Wiley-VCH
-
M. Thuillard, P. Ryser, and G. Pfister, "Life safety and security systems", in Sensors in Intelligent Buildings, vol. 2. Weinheim, Germany: Wiley-VCH, 2001, pp. 307-397.
-
(2001)
Sensors in Intelligent Buildings
, vol.2
, pp. 307-397
-
-
Thuillard, M.1
Ryser, P.2
Pfister, G.3
-
3
-
-
47849131182
-
Common approach to functional safety and system security in building automation and control systems
-
T. Novak, A. Treytl, and P. Palensky, "Common approach to functional safety and system security in building automation and control systems", in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2007, pp. 1141-1148.
-
(2007)
Proc. IEEE Int. Conf. Emerging Technol. Factory Autom.
, pp. 1141-1148
-
-
Novak, T.1
Treytl, A.2
Palensky, P.3
-
6
-
-
33646430870
-
Securing embedded systems
-
Mar
-
D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, "Securing embedded systems", IEEE Security Privacy, vol. 4, no. 2, pp. 40-49, Mar. 2006.
-
(2006)
IEEE Security Privacy
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
7
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Aug
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges", ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, Aug. 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
8
-
-
70349619163
-
Industrial wireless sensor networks: Challenges, design principles, and technical approaches
-
Oct
-
V. Gungor and G. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approaches", IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258-4265, Oct. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.1
Hancke, G.2
-
11
-
-
21644434346
-
-
Konnex Assoc., Diegem, Belgium, Ver. 2.0
-
KNX Specification, Konnex Assoc., Diegem, Belgium, 2009, Ver. 2.0.
-
(2009)
KNX Specification
-
-
-
13
-
-
54849429055
-
-
ZigBee Alliance, San Ramon, CA
-
ZigBee Specification 2007, ZigBee Alliance, San Ramon, CA, 2007.
-
(2007)
ZigBee Specification 2007
-
-
-
14
-
-
0347146126
-
-
Nat. Inst. Standards Technol., Gaithersburg, MD, NISTIR Tech. Rep. 7009
-
D. G. Holmberg, "BACnet wide area network security threat assessment", Nat. Inst. Standards Technol., Gaithersburg, MD, NISTIR Tech. Rep. 7009, 2003.
-
(2003)
BACnet Wide Area Network Security Threat Assessment
-
-
Holmberg, D.G.1
-
15
-
-
77958008993
-
-
ANSI/ASHRAE Addendum 135-2008 g: May, Status: 5th public review. Online. Available
-
ANSI/ASHRAE Addendum 135-2008 g: Updating BACnet Network Security, May 2010, Status: 5th public review. [Online]. Available: http://bacnet.org/Addenda/ index.html
-
(2010)
Updating BACnet Network Security
-
-
-
18
-
-
41549140993
-
Security in networked building automation systems
-
1704168, WFCS 2006: 2006 IEEE International Workshop on Factory Communication Systems, Proceedings
-
W. Granzer, W. Kastner, G. Neugschwandtner, and F. Praus, "Security in networked building automation systems", in Proc. IEEE Int. Workshop Factory Commun. Syst., 2006, pp. 283-292. (Pubitemid 351470990)
-
(2006)
IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS
, pp. 283-292
-
-
Granzer, W.1
Kastner, W.2
Neugschwandtner, G.3
Praus, F.4
-
19
-
-
31444441499
-
Elliptic curve cryptography engineering
-
Feb
-
A. Cilardo, L. Coppolino, N. Mazzocca, and L. Romano, "Elliptic curve cryptography engineering", Proc. IEEE, vol. 943, no. 2, pp. 395-406, Feb. 2006.
-
(2006)
Proc. IEEE
, vol.943
, Issue.2
, pp. 395-406
-
-
Cilardo, A.1
Coppolino, L.2
Mazzocca, N.3
Romano, L.4
-
20
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
-
Dec
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded Internet", Pervasive Mobile Comput., vol. 1, no. 4, pp. 425-445, Dec. 2005.
-
(2005)
Pervasive Mobile Comput.
, vol.1
, Issue.4
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
21
-
-
62549133356
-
Robust and efficient passwordauthenticated key agreement using smart cards
-
Jun
-
W.-S. Juang, S.-T. Chen, and H.-T. Liaw, "Robust and efficient passwordauthenticated key agreement using smart cards", IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.-S.1
Chen, S.-T.2
Liaw, H.-T.3
-
22
-
-
56349147514
-
Key set management in networked building automation systems using multiple key servers
-
W. Granzer, C. Reinisch, and W. Kastner, "Key set management in networked building automation systems using multiple key servers", in Proc. IEEE Int. Workshop Factory Commun. Syst., 2008, pp. 205-214.
-
(2008)
Proc. IEEE Int. Workshop Factory Commun. Syst.
, pp. 205-214
-
-
Granzer, W.1
Reinisch, C.2
Kastner, W.3
-
24
-
-
85015880452
-
Elliptic and hyperelliptic curves on embedded μP
-
Aug
-
T. Wollinger, J. Pelzl, V. Wittelsberger, C. Paar, K. Saldamli, and C. K. Koc, "Elliptic and hyperelliptic curves on embedded μP", ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 509-533, Aug. 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 509-533
-
-
Wollinger, T.1
Pelzl, J.2
Wittelsberger, V.3
Paar, C.4
Saldamli, K.5
Koc, C.K.6
-
25
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A secure sensor network communication architecture", in Proc. Int. Conf. Inf. Process. Sens. Netw., 2007, pp. 479-488.
-
(2007)
Proc. Int. Conf. Inf. Process. Sens. Netw.
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
26
-
-
71049165994
-
Securing IP backbones in building automation networks
-
W. Granzer, D. Lechner, F. Praus, and W. Kastner, "Securing IP backbones in building automation networks", in Proc. IEEE Int. Conf. Ind. Informat., 2009, pp. 410-415.
-
(2009)
Proc. IEEE Int. Conf. Ind. Informat.
, pp. 410-415
-
-
Granzer, W.1
Lechner, D.2
Praus, F.3
Kastner, W.4
-
27
-
-
56349168450
-
Denial-of-service in automation systems
-
Factory Autom.
-
W. Granzer, C. Reinisch, and W. Kastner, "Denial-of-service in automation systems", in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2008, pp. 468-471.
-
(2008)
Proc. IEEE Int. Conf. Emerging Technol.
, pp. 468-471
-
-
Granzer, W.1
Reinisch, C.2
Kastner, W.3
-
28
-
-
77957992139
-
A tutorial on physical security and sidechannel attacks
-
Berlin, Germany: Springer-Verlag, Sep
-
F. Koeune and F.-X. Standaert, "A tutorial on physical security and sidechannel attacks", in Foundations of Security Analysis and Design III. Berlin, Germany: Springer-Verlag, Sep. 2005, pp. 78-108.
-
(2005)
Foundations of Security Analysis and Design III
, pp. 78-108
-
-
Koeune, F.1
Standaert, F.-X.2
-
29
-
-
10944267118
-
Static analysis for security
-
Nov
-
B. Chess and G. McGraw, "Static analysis for security", IEEE Security Privacy, vol. 2, no. 6, pp. 76-79, Nov. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.6
, pp. 76-79
-
-
Chess, B.1
McGraw, G.2
-
30
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
Berlin, Germany: Springer-Verlag, Jan
-
G. C. Necula and P. Lee, "Safe, untrusted agents using proof-carrying code", in Mobile Agents and Security, vol. 1419, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, Jan. 1998, pp. 61-91.
-
(1998)
Mobile Agents and Security, Vol. 1419, Lecture Notes in Computer Science
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
31
-
-
33745479804
-
Theoretical basis for intrusion detection
-
Z. Li, A. Das, and J. Zhou, "Theoretical basis for intrusion detection", in Proc. IEEE Inf. Assurance Workshop, 2005, pp. 184-192.
-
(2005)
Proc. IEEE Inf. Assurance Workshop
, pp. 184-192
-
-
Li, Z.1
Das, A.2
Zhou, J.3
-
32
-
-
85084162336
-
Secure execution via program shepherding
-
V. Kiriansky, D. Bruening, and S. Amarasinghe, "Secure execution via program shepherding", in Proc. USENIX Security Symp., 2002, pp. 191-206.
-
(2002)
Proc. USENIX Security Symp.
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
33
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, and M. H. Jakubowski, "Oblivious hashing: A stealthy software integrity verification primitive", in Proc. Int. Workshop Inf. Hiding, 2003, pp. 400-414.
-
(2003)
Proc. Int. Workshop Inf. Hiding
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
34
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks", in Proc. USENIX Security Conf., 1998, pp. 63-78.
-
(1998)
Proc. USENIX Security Conf.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
35
-
-
33846644420
-
Hardware-assisted run-time monitoring for secure program execution on embedded processors
-
Dec
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, "Hardware-assisted run-time monitoring for secure program execution on embedded processors", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 14, no. 12, pp. 1295-1308, Dec. 2006.
-
(2006)
IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
, vol.14
, Issue.12
, pp. 1295-1308
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
36
-
-
38749115957
-
Towards scalable and secure execution platform for embedded systems
-
I. Hiroaki, M. Edahiro, and J. Sakai, "Towards scalable and secure execution platform for embedded systems", in Proc. Des. Autom. Conf., 2007, pp. 350-354.
-
(2007)
Proc. Des. Autom. Conf.
, pp. 350-354
-
-
Hiroaki, I.1
Edahiro, M.2
Sakai, J.3
-
37
-
-
0027029758
-
Undecidability of static analysis
-
dec
-
W. Landi, "Undecidability of static analysis", ACM Lett. Program. Lang. Syst., vol. 1, no. 4, pp. 323-337, Dec. 1992.
-
(1992)
ACM Lett. Program. Lang. Syst.
, vol.1
, Issue.4
, pp. 323-337
-
-
Landi, W.1
-
38
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney, "Model-carrying code: A practical approach for safe execution of untrusted applications", in Proc. ACM Symp. Oper. Syst. Principles, 2003, pp. 15-28.
-
(2003)
Proc. ACM Symp. Oper. Syst. Principles
, pp. 15-28
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
39
-
-
56349143732
-
Secure and customizable software applications in embedded networks
-
F. Praus, T. F. Thomas, and W. Kastner, "Secure and customizable software applications in embedded networks", in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2008, pp. 1473-1480.
-
(2008)
Proc. IEEE Int. Conf. Emerging Technol. Factory Autom.
, pp. 1473-1480
-
-
Praus, F.1
Thomas, T.F.2
Kastner, W.3
-
40
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal verification of an OS kernel", in Proc. ACM Symp. Oper. Syst. Principles, 2009, pp. 207-220.
-
(2009)
Proc. ACM Symp. Oper. Syst. Principles
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
41
-
-
71049171702
-
Enhanced control application development in building automation
-
F. Praus, W. Granzer, and W. Kastner, "Enhanced control application development in building automation", in Proc. IEEE Int. Conf. Ind. Informat., 2009, pp. 390-395.
-
(2009)
Proc. IEEE Int. Conf. Ind. Informat.
, pp. 390-395
-
-
Praus, F.1
Granzer, W.2
Kastner, W.3
|