共 63 条
[1]
[Anonymous], HACKERS REMOTELY KIL
[2]
[Anonymous], 2018, Dagstuhl Reports
[3]
[Anonymous], 2017, Briefing, Black Hat USA
[4]
[Anonymous], 1992, Journal of Computer Security
[5]
[Anonymous], 2005, OSEK VDX OPERATING S
[6]
Feasibility analysis of recurring branching tasks
[J].
10TH EUROMICRO WORKSHOP ON REAL-TIME SYSTEMS, PROCEEDINGS,
1998,
:138-145
[7]
Bletsas Konstantinos, 2018, LEIBNIZ T EMBEDDED S, V5, DOI [10.4230/LITESv005-i001-a002, DOI 10.4230/LITESV005-I001-A002]
[8]
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2267-2281
[9]
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[10]
Chen CY, 2019, Arxiv, DOI arXiv:1806.01393