共 44 条
[1]
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions
[J].
PROCEEDINGS OF THE 2020 JOINT WORKSHOP ON CPS&IOT SECURITY AND PRIVACY, CPSIOTSEC 2020,
2020,
:81-86
[3]
[Anonymous], 2010, Preprints of the 1st Workshop on Secure Control Systems
[4]
Aripin M.K., 2014, INT J VEHICULAR TECH, DOI DOI 10.1155/2014/437515
[5]
Astrom K. J., 2013, Computer-Controlled Systems: Theory and Design
[6]
HyLAA: A Tool for Computing Simulation-Equivalent Reachability for Linear Systems
[J].
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL (PART OF CPS WEEK) (HSCC' 17),
2017,
:173-178
[7]
Bjorner Nikolaj, 2018, INT SUMM SCH ENG TRU, P148
[8]
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[9]
Error Handling of In-vehicle Networks Makes Them Vulnerable
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1044-1055
[10]
Cimatti Alessandro, 2015, Tools and Algorithms for the Construction and Analysis of Systems. 21st International Conference, TACAS 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015. Proceedings: LNCS 9035, P52, DOI 10.1007/978-3-662-46681-0_4