-
6
-
-
85001618596
-
Google self-driving car project
-
Feb
-
Google self-driving car project. Monthly Report, Feb. 2016.
-
(2016)
Monthly Report
-
-
-
8
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
May
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using ic fingerprinting. In 2007 IEEE Symposium on Security and Privacy (SP '07), pages 296-310, May 2007.
-
(2007)
2007 IEEE Symposium on Security and Privacy (SP '07)
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
10
-
-
84890430168
-
A comprehensive survey on vehicular ad hoc network
-
S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan. A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37:380-392, 2014.
-
(2014)
Journal of Network and Computer Applications
, vol.37
, pp. 380-392
-
-
Al-Sultan, S.1
Al-Doori, M.M.2
Al-Bayatti, A.H.3
Zedan, H.4
-
11
-
-
84868693261
-
Secure automotive on-board electronics network architecture
-
L. Apvrille, R. El Khayari, O. Henniger, Y. Roudier, H. Schweppe, H. Seudié, B. Weyl, and M. Wolf. Secure automotive on-board electronics network architecture. In FISITA 2010 World Automotive Congress, Budapest, Hungary, volume 8, 2010.
-
(2010)
FISITA 2010 World Automotive Congress, Budapest, Hungary
, vol.8
-
-
Apvrille, L.1
El Khayari, R.2
Henniger, O.3
Roudier, Y.4
Schweppe, H.5
Seudié, H.6
Weyl, B.7
Wolf, M.8
-
12
-
-
84975230680
-
M3: A hardware/operating-system co-design to tame heterogeneous manycores
-
New York, NY, USA, ACM
-
N. Asmussen, M. Völp, B. Nöthen, H. Härtig, and G. Fettweis. M3: A hardware/operating-system co-design to tame heterogeneous manycores. In 21st Int. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS '16, pages 189-203, New York, NY, USA, 2016. ACM.
-
(2016)
21st Int. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS '16
, pp. 189-203
-
-
Asmussen, N.1
Völp, M.2
Nöthen, B.3
Härtig, H.4
Fettweis, G.5
-
13
-
-
84890588314
-
Stealthy dopant-level hardware trojans
-
Berlin, Heidelberg, Springer-Verlag
-
G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson. Stealthy dopant-level hardware trojans. In Proceedings of the 15th International Conference on Cryptographic Hardware and Embedded Systems, CHES'13, pages 197-214, Berlin, Heidelberg, 2013. Springer-Verlag.
-
(2013)
Proceedings of the 15th International Conference on Cryptographic Hardware and Embedded Systems, CHES'13
, pp. 197-214
-
-
Becker, G.T.1
Regazzoni, F.2
Paar, C.3
Burleson, W.P.4
-
16
-
-
84885996526
-
The Karyon project: Predictable and safe coordination in cooperative vehicular systems
-
A. Casimiro, J. Kaiser, E. M. Schiller, P. Costa, J. Parizi, R. Johansson, and R. Librino. The Karyon project: Predictable and safe coordination in cooperative vehicular systems. In 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pages 1-12, 2013.
-
(2013)
43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)
, pp. 1-12
-
-
Casimiro, A.1
Kaiser, J.2
Schiller, E.M.3
Costa, P.4
Parizi, J.5
Johansson, R.6
Librino, R.7
-
17
-
-
4143132280
-
An architectural framework and a middleware for cooperating smart components
-
Ischia, Italy, ACM
-
A. Casimiro, J. Kaiser, and P. Verissimo. An architectural framework and a middleware for cooperating smart components. In 1st Conference on Computing Frontiers, pages 28-39, Ischia, Italy, 2004. ACM.
-
(2004)
1st Conference on Computing Frontiers
, pp. 28-39
-
-
Casimiro, A.1
Kaiser, J.2
Verissimo, P.3
-
18
-
-
85001833549
-
-
Accessed: 2016-07-22
-
CBSNEWS. Toyota "unintended acceleration" has killed 89. http://www.cbsnews.com/news/toyotaunintended-acceleration-has-killed-89/. Accessed: 2016-07-22.
-
Toyota "unintended Acceleration" Has Killed 89
-
-
-
19
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
San Francisco
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno, et al. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium. San Francisco, 2011.
-
(2011)
USENIX Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
20
-
-
84964499977
-
Flexray communications system-protocol specification
-
F. Consortium et al. Flexray communications system-protocol specification. Version, 2(1):198-207, 2005.
-
(2005)
Version
, vol.2
, Issue.1
, pp. 198-207
-
-
-
21
-
-
84979683582
-
-
Technical report, Massachusetts Institute of Technology, (Accessed: 2016-07-22)
-
V. Costan and S. Devadas. Intel SGX explained. Technical report, Massachusetts Institute of Technology, 2016. https://eprint.iacr.org/2016/086.pdf (Accessed: 2016-07-22).
-
(2016)
Intel SGX Explained
-
-
Costan, V.1
Devadas, S.2
-
22
-
-
84905103355
-
Security in wireless ad-hoc networks-a survey
-
R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer. Security in wireless ad-hoc networks-a survey. Comp. Comm., 51:1-20, 2014.
-
(2014)
Comp. Comm.
, vol.51
, pp. 1-20
-
-
Di Pietro, R.1
Guarino, S.2
Verde, N.V.3
Domingo-Ferrer, J.4
-
23
-
-
84947273682
-
The Sybil attack
-
Springer
-
J. R. Douceur. The Sybil attack. In Peer-to-peer Systems, pages 251-260. Springer, 2002.
-
(2002)
Peer-to-peer Systems
, pp. 251-260
-
-
Douceur, J.R.1
-
24
-
-
85001698627
-
-
Accessed: 2016-07-22
-
E. Enterprise. Erika enterprise 3. http://erika.tuxfamily.org/drupal/content/erikaenterprise-3. Accessed: 2016-07-22.
-
Erika Enterprise 3
-
-
-
25
-
-
80051939470
-
OS diversity for intrusion tolerance: Myth or reality?
-
M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro. OS diversity for intrusion tolerance: Myth or reality? In IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pages 383-394, 2011.
-
(2011)
IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)
, pp. 383-394
-
-
Garcia, M.1
Bessani, A.2
Gashi, I.3
Neves, N.4
Obelheiro, R.5
-
26
-
-
84890887487
-
Efficient wireless security through jamming, coding and routing
-
New Orleans, USA, June IEEE
-
M. Ghaderi, D. Goeckel, A. Orda, and M. Dehghan. Efficient wireless security through jamming, coding and routing. In Sensor, Mesh and Ad Hoc Communications and Networks (SECON), New Orleans, USA, June 2013. IEEE.
-
(2013)
Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Ghaderi, M.1
Goeckel, D.2
Orda, A.3
Dehghan, M.4
-
27
-
-
51349150827
-
Reliability gain of network coding in lossy wireless networks
-
Phoenix, USA, April
-
M. Ghaderi, D. Towsley, and J. Kurose. Reliability gain of network coding in lossy wireless networks. In IEEE INFOCOM, Phoenix, USA, April 2008.
-
(2008)
IEEE INFOCOM
-
-
Ghaderi, M.1
Towsley, D.2
Kurose, J.3
-
29
-
-
84995387126
-
A communication framework for distributed access control in microkernel-based systems
-
Toulouse, France, July
-
M. Hamad, J. Schlatow, V. Prevelakis, and R. Ernst. A communication framework for distributed access control in microkernel-based systems. In 12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT16), pages 11-16, Toulouse, France, July 2016.
-
(2016)
12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT16)
, pp. 11-16
-
-
Hamad, M.1
Schlatow, J.2
Prevelakis, V.3
Ernst, R.4
-
30
-
-
84939202658
-
Sirius: An open end-to-end voice and vision personal assistant and its implications for future warehouse scale computers
-
ACM
-
J. Hauswald, M. A. Laurenzano, Y. Zhang, C. Li, A. Rovinski, A. Khurana, R. G. Dreslinski, T. Mudge, V. Petrucci, L. Tang, et al. Sirius: An open end-to-end voice and vision personal assistant and its implications for future warehouse scale computers. In Architectural Support for Programming Languages and Operating Systems (ASPLOS), pages 223-238. ACM, 2015.
-
(2015)
Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 223-238
-
-
Hauswald, J.1
Laurenzano, M.A.2
Zhang, Y.3
Li, C.4
Rovinski, A.5
Khurana, A.6
Dreslinski, R.G.7
Mudge, T.8
Petrucci, V.9
Tang, L.10
-
31
-
-
84862014286
-
Rtos support for multicore mixed-criticality systems
-
April
-
J. L. Herman, C. J. Kenna, M. S. Mollison, J. H. Anderson, and D. M. Johnson. Rtos support for multicore mixed-criticality systems. In 18th IEEE Real Time and Embedded Technology and Applications Symposium, pages 197-208, April 2012.
-
(2012)
18th IEEE Real Time and Embedded Technology and Applications Symposium
, pp. 197-208
-
-
Herman, J.L.1
Kenna, C.J.2
Mollison, M.S.3
Anderson, J.H.4
Johnson, D.M.5
-
32
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Springer
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Advances in Cryptology - CRYPT0 95, pages 339-352. Springer, 1995.
-
(1995)
Advances in Cryptology - CRYPT0 95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
33
-
-
56449088090
-
Security threats to automotive CAN networks-practical examples and selected short-term countermeasures
-
Springer
-
T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. In Computer Safety, Reliability, and Security, pages 235-248. Springer, 2008.
-
(2008)
Computer Safety, Reliability, and Security
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
34
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole attacks in wireless networks. IEEE Jour. on Selected Areas in Communications, 24(2):370-380, 2006.
-
(2006)
IEEE Jour. on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
35
-
-
84973446574
-
Privacy is dead, long live privacy
-
May
-
J.-P. Hubaux and A. Juels. Privacy is dead, long live privacy. Commun. ACM, 59(6):39-41, May 2016.
-
(2016)
Commun. ACM
, vol.59
, Issue.6
, pp. 39-41
-
-
Hubaux, J.-P.1
Juels, A.2
-
38
-
-
84941636863
-
Cars of the future: The Internet of Things in the automotive industry
-
R. Kirk. Cars of the future: the Internet of Things in the automotive industry. Network Security, 2015(9):16-18, 2015.
-
(2015)
Network Security
, vol.2015
, Issue.9
, pp. 16-18
-
-
Kirk, R.1
-
39
-
-
84878639399
-
Integrity in embedded control networks
-
P. Koopman and C. Szilagyi. Integrity in embedded control networks. IEEE Security & Privacy, 11(3):61-63, 2013.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.3
, pp. 61-63
-
-
Koopman, P.1
Szilagyi, C.2
-
40
-
-
0003245534
-
Real-Time and Dependability Concepts
-
chapter ACM-Press, Addison-Wesley, 2nd edition
-
H. Kopetz and P. Veríssimo. Distributed Systems, chapter Real-Time and Dependability Concepts. ACM-Press, Addison-Wesley, 2nd edition, 1993.
-
(1993)
Distributed Systems
-
-
Kopetz, H.1
Veríssimo, P.2
-
41
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy (SP), pages 447-462, 2010.
-
(2010)
IEEE Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
-
42
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. on Progr. Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Trans. on Progr. Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
45
-
-
84860436171
-
A novel ID-based authentication framework with adaptive privacy preservation for vanets
-
IEEE
-
H. Lu, J. Li, and M. Guizani. A novel ID-based authentication framework with adaptive privacy preservation for vanets. In Computing, Communications and Applications Conference (ComComAp), pages 345-350. IEEE, 2012.
-
(2012)
Computing, Communications and Applications Conference (ComComAp)
, pp. 345-350
-
-
Lu, H.1
Li, J.2
Guizani, M.3
-
46
-
-
85001867660
-
-
Master's thesis, Faculty of Science, Technology and Communication - University of Luxembourg, Aug. Sec. 5.6: Face Pixelation
-
P. Ludivig. Detection of faces for mobile robots. Master's thesis, Faculty of Science, Technology and Communication - University of Luxembourg, Aug. 2015. Sec. 5.6: Face Pixelation.
-
(2015)
Detection of Faces for Mobile Robots
-
-
Ludivig, P.1
-
47
-
-
84904263520
-
Survey on VANET security challenges and possible cryptographic solutions
-
M. N. Mejri, J. Ben-Othman, and M. Hamdi. Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1(2):53-66, 2014.
-
(2014)
Vehicular Communications
, vol.1
, Issue.2
, pp. 53-66
-
-
Mejri, M.N.1
Ben-Othman, J.2
Hamdi, M.3
-
48
-
-
84953273645
-
Remote exploitation of an unaltered passenger vehicle
-
C. Miller and C. Valasek. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015.
-
(2015)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
49
-
-
84955710198
-
Survey on security issues in vehicular ad hoc networks
-
B. Mokhtar and M. Azab. Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4):1115-1126, 2015.
-
(2015)
Alexandria Engineering Journal
, vol.54
, Issue.4
, pp. 1115-1126
-
-
Mokhtar, B.1
Azab, M.2
-
50
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
ACM
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. In 3rd International Symposium on Information processing in sensor networks, pages 259-268. ACM, 2004.
-
(2004)
3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
51
-
-
85001577526
-
-
C. of Oklahoma County. Accessed: 2016-07-22
-
C. of Oklahoma County. Bookout vs toyota. http://www.safetyresearch.net/Library/Bookout v Toyota Barr REDACTED.pdf. Accessed: 2016-07-22.
-
Bookout vs Toyota
-
-
-
52
-
-
85052678926
-
Bootstrapping trust in a "trusted" platform
-
Berkeley, CA, USA, USENIX Association
-
B. Parno. Bootstrapping trust in a "trusted" platform. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, pages 9:1-9:6, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08
, pp. 9:1-9:6
-
-
Parno, B.1
-
54
-
-
84906230362
-
A practical attack against GPRS/EDGE/UMTS/ HSPA mobile data communications
-
D. Perez and J. Pico. A practical attack against GPRS/EDGE/UMTS/ HSPA mobile data communications. Black Hat DC, 2011.
-
(2011)
Black Hat DC
-
-
Perez, D.1
Pico, J.2
-
56
-
-
85001860838
-
Remote attacks on automated vehicles sensors: Experiments on camera and lidar
-
J. Petit, B. Stottelaar, M. Feiri, and F. Kargl. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. In Black Hat Europe, 2015.
-
(2015)
Black Hat Europe
-
-
Petit, J.1
Stottelaar, B.2
Feiri, M.3
Kargl, F.4
-
59
-
-
4143068955
-
Evolution of local interconnect network (LIN) solutions
-
IEEE
-
M. Ruff. Evolution of local interconnect network (LIN) solutions. In 58th Vehicular Tech. Conf. (VTC 2003-Fall), volume 5, pages 3382-3389. IEEE, 2003.
-
(2003)
58th Vehicular Tech. Conf. (VTC 2003-Fall)
, vol.5
, pp. 3382-3389
-
-
Ruff, M.1
-
60
-
-
0032264283
-
Hardware support for can fault-tolerant communication
-
Sept.
-
J. Rufino, N. Pedrosa, J. Monteiro, P. Verissimo, and G. Arroz. Hardware support for can fault-tolerant communication. In Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, Lisboa, Portugal, September 1998, Sept. 1998.
-
(1998)
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, Lisboa, Portugal, September 1998
-
-
Rufino, J.1
Pedrosa, N.2
Monteiro, J.3
Verissimo, P.4
Arroz, G.5
-
61
-
-
0037251378
-
Language-based information-flow security
-
Sept.
-
A. Sabelfeld and A. C. Myers. Language-based information-flow security. IEEE J.Sel. A. Commun., 21(1):5-19, Sept. 2006.
-
(2006)
IEEE J.Sel. A. Commun.
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
62
-
-
80455138227
-
-
Technical report, DTIC Document
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for VANET. Technical report, DTIC Document, 2005.
-
(2005)
CARAVAN: Providing Location Privacy for VANET
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
63
-
-
85001604015
-
Contract-based automated integration for complex component-based systems
-
March
-
J. Schlatow, R. Ernst, M. Nolte, and M. Maurer. Contract-based automated integration for complex component-based systems. Design, Automation and Test in Europe - Demo, March 2016.
-
(2016)
Design, Automation and Test in Europe - Demo
-
-
Schlatow, J.1
Ernst, R.2
Nolte, M.3
Maurer, M.4
-
65
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. of the ACM, 22(11):612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
66
-
-
77649269780
-
Highly available intrusion-tolerant services with proactive-reactive recovery
-
P. Sousa, A. N. Bessani, M. Correia, N. F. Neves, and P. Verissimo. Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Trans. on Parallel & Distributed Systems, pages 452-465, 2009.
-
(2009)
IEEE Trans. on Parallel & Distributed Systems
, pp. 452-465
-
-
Sousa, P.1
Bessani, A.N.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
68
-
-
85001710344
-
A security architecture for multipurpose ECUs in vehicles
-
Ingolstadt, Germany
-
F. Stumpf, C. Meves, B. Weyl, and M. Wolf. A security architecture for multipurpose ECUs in vehicles. In 25th Joint VDI/VW Automotive Security Conference, Ingolstadt, Germany, 2009.
-
(2009)
25th Joint VDI/VW Automotive Security Conference
-
-
Stumpf, F.1
Meves, C.2
Weyl, B.3
Wolf, M.4
-
69
-
-
85001716109
-
-
Accessed: 2016-07-22
-
Sysgo. Pikeos. https://www.sysgo.com/solutions/industrysolutions/automotive/. Accessed: 2016-07-22.
-
Pikeos
-
-
-
70
-
-
84925331214
-
-
arXiv preprint arXiv:1312.6199
-
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013.
-
(2013)
Intriguing Properties of Neural Networks
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
Goodfellow, I.6
Fergus, R.7
-
72
-
-
78649521961
-
Merasa: Multicore Execution of Hard Real-Time Applications Supporting Analyzability
-
T. Ungerer, F. Cazorla, P. Sainrat, G. Bernat, Z. Petrov, C. Rochange, E. Quinones, M. Gerdes, M. Paolieri, J. Wolf, H. Casse, S. Uhrig, I. Guliashvili, M. Houston, F. Kluge, S. Metzlaff, and J. Mische. Merasa: Multicore Execution of Hard Real-Time Applications Supporting Analyzability. IEEE Micro, 30(5):66-75, 2010.
-
(2010)
IEEE Micro
, vol.30
, Issue.5
, pp. 66-75
-
-
Ungerer, T.1
Cazorla, F.2
Sainrat, P.3
Bernat, G.4
Petrov, Z.5
Rochange, C.6
Quinones, E.7
Gerdes, M.8
Paolieri, M.9
Wolf, J.10
Casse, H.11
Uhrig, S.12
Guliashvili, I.13
Houston, M.14
Kluge, F.15
Metzlaff, S.16
Mische, J.17
-
73
-
-
33747276448
-
Intrusion-tolerant middleware: The road to automatic security
-
July
-
P. E. Verissimo, N. F. Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch. Intrusion-tolerant middleware: the road to automatic security. IEEE Security Privacy, 4(4):54-62, July 2006.
-
(2006)
IEEE Security Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Verissimo, P.E.1
Neves, N.F.2
Cachin, C.3
Poritz, J.4
Powell, D.5
Deswarte, Y.6
Stroud, R.7
Welch, I.8
-
74
-
-
85001710327
-
Reliability analysis of consensus in cooperative transport systems
-
M. Roy, editor, Toulouse, France, Sept.
-
E. Villani, N. Fathollahnejad, R. Pathan, R. Barbosa, and J. Karlsson. Reliability analysis of consensus in cooperative transport systems. In M. Roy, editor, SAFECOMP 2013 - Workshop ASCoMS (Architecting Safety in Collaborative Mobile Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse, France, Sept. 2013.
-
(2013)
SAFECOMP 2013 - Workshop ASCoMS (Architecting Safety in Collaborative Mobile Systems) of the 32nd International Conference on Computer Safety, Reliability and Security
-
-
Villani, E.1
Fathollahnejad, N.2
Pathan, R.3
Barbosa, R.4
Karlsson, J.5
-
75
-
-
85001532841
-
-
Accessed: 2016-07-22
-
Windriver. Vxworks. http://windriver.com/products/vxworks/. Accessed: 2016-07-22.
-
Vxworks
-
-
-
76
-
-
84903459916
-
Design, implementation, and evaluation of a vehicular hardware security module
-
Springer
-
M. Wolf and T. Gendrullis. Design, implementation, and evaluation of a vehicular hardware security module. In Information Security and Cryptology-ICISC 2011, pages 302-318. Springer, 2011.
-
Information Security and Cryptology-ICISC 2011
, vol.2011
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
78
-
-
84978519642
-
Scheduling tasks with mixed timing constraints in gpu-powered real-time systems
-
ACM
-
Y. Xu, R. Wang, T. Li, M. Song, L. Gao, Z. Luan, and D. Qian. Scheduling tasks with mixed timing constraints in gpu-powered real-time systems. In Proceedings of the 2016 International Conference on Supercomputing, page 30. ACM, 2016.
-
(2016)
Proceedings of the 2016 International Conference on Supercomputing
, pp. 30
-
-
Xu, Y.1
Wang, R.2
Li, T.3
Song, M.4
Gao, L.5
Luan, Z.6
Qian, D.7
-
79
-
-
84987642016
-
A2: Analog malicious hardware
-
K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester. A2: Analog malicious hardware. In IEEE Security and Privacy (SP), 2016.
-
(2016)
IEEE Security and Privacy (SP)
-
-
Yang, K.1
Hicks, M.2
Dong, Q.3
Austin, T.4
Sylvester, D.5
-
82
-
-
0345757359
-
COCA: A secure distributed online certification authority
-
L. Zhou, F. B. Schneider, and R. Van Renesse. COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems (TOCS), 20(4):329-368, 2002.
-
(2002)
ACM Transactions on Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|