-
1
-
-
85056536834
-
Platform-based design for embedded systems
-
CRC Press
-
L. Carloni, F. D. Bernardinis, C. Pinello, A. Sangiovanni-Vincentelli, and M. Sgroi, "Platform-based design for embedded systems, " Embedded Systems Handbook, CRC Press, 2005.
-
(2005)
Embedded Systems Handbook
-
-
Carloni, L.1
Bernardinis, F.D.2
Pinello, C.3
Sangiovanni-Vincentelli, A.4
Sgroi, M.5
-
2
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces, " USENIX Conf. on Security, 2011.
-
(2011)
USENIX Conf. on Security
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
4
-
-
79960771504
-
Security aspects of the in-vehicle network in the connected car
-
P. Kleberger, T. Olovsson, and E. Jonsson, "Security aspects of the in-vehicle network in the connected car, " IEEE Intelligent Vehicles Symp., pp. 528-533, 2011.
-
(2011)
Intelligent Vehicles Symp
, pp. 528-533
-
-
Kleberger, P.1
Olovsson, T.2
Jonsson, E.3
-
5
-
-
84863550114
-
EDA for secure and dependable cybercars: Challenges and opportunities
-
F. Koushanfar, A.-R. Sadeghi, and H. Seudie, "EDA for secure and dependable cybercars: challenges and opportunities, " ACM/IEEE Design Automation Conf., pp. 220-228, 2012.
-
(2012)
ACM/IEEE Design Automation Conf
, pp. 220-228
-
-
Koushanfar, F.1
Sadeghi, A.-R.2
Seudie, H.3
-
6
-
-
84893388821
-
Security-Aware mapping for CAN-based real-Time distributed automotive systems
-
C.-W. Lin, Q. Zhu, C. Phung, and A. Sangiovanni-Vincentelli, "Security-Aware mapping for CAN-based real-Time distributed automotive systems, " IEEE/ACM International Conf. on Computer-Aided Design, pp. 115-121, 2013.
-
(2013)
IEEE/ACM International Conf. on Computer-Aided Design
, pp. 115-121
-
-
Lin, C.-W.1
Zhu, Q.2
Phung, C.3
Sangiovanni-Vincentelli, A.4
-
7
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient authentication and signing of multicast streams over lossy channels, " IEEE Symp. on Security and Privacy, pp. 56-73, 2000.
-
(2000)
Symp. on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
8
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast, " Network and Distributed System Security Symp., pp. 35-46, 2001.
-
(2001)
Network and Distributed System Security Symp
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
10
-
-
84936865319
-
-
Time-Triggered Ethernet, SAE AS6802 Standard
-
SAE Aerospace, "Time-Triggered Ethernet, " SAE AS6802 Standard, 2011.
-
(2011)
SAE Aerospace
-
-
-
11
-
-
79957990720
-
Authentication in time-Triggered systems using time-delayed release of keys
-
A. Wasicek, C. El-Salloum, and H. Kopetz, "Authentication in time-Triggered systems using time-delayed release of keys, " IEEE International Symp. on Object/Component/Service-Oriented Real-Time Distributed Computing, pp. 31-39, 2011.
-
(2011)
International Symp. on Object/Component/Service-Oriented Real-Time Distributed Computing
, pp. 31-39
-
-
Wasicek, A.1
El-Salloum, C.2
Kopetz, H.3
-
12
-
-
78149466756
-
Optimizing the software architecture for extensibility in hard real-Time distributed systems
-
Q. Zhu, Y. Yang, M. Di Natale, E. Scholte, and A. Sangiovanni-Vincentelli, "Optimizing the software architecture for extensibility in hard real-Time distributed systems, " IEEE Trans. on Industrial Informatics, vol. 6, no. 4, pp. 621-636, 2010.
-
(2010)
Trans. on Industrial Informatics
, vol.6
, Issue.4
, pp. 621-636
-
-
Zhu, Q.1
Yang, Y.2
Di Natale, M.3
Scholte, E.4
Sangiovanni-Vincentelli, A.5
|