共 25 条
[1]
Abraham A., 2005, I MANAGERS J FUTURE, V1, P74, DOI DOI 10.26634/JFET.1.1.968
[2]
[Anonymous], 2005, 301 CIA
[3]
Avizienis Algirdas, 2004, IEEE T DEPENDABLE SE
[4]
Bogdanov Andrey, 2007, TRUSTED COMPUTING
[5]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[6]
Heitmann M, 2006, EMBEDDED SECURITY IN CARS: SECURING CURRENT AND FUTURE AUTOMOTIVE IT APPLICATIONS, P233, DOI 10.1007/3-540-28428-1_14
[7]
Hoppe T, 2008, P 27 INT C SAFECOMP
[8]
Hoppe T, 2009, J INF ASSUR SECUR, V4, P226
[9]
Hoppe Tobias, 2007, CD P 2 WORKSH EMB SY
[10]
Kargl F., IEEE COMMUNICATIONS, V46, P2