共 16 条
[1]
[Anonymous], 2003, P ACM WORKSH SEC AD
[2]
[Anonymous], WORKSH EMB IT SEC CA
[3]
*BOSCH, 1991, CAN SPEC 2 0
[4]
CHEUNG S, 2007, P SCAD SEC SCI S MIA
[5]
*CIA, 2005, 301 CIA
[6]
Hoppe T, 2007, P 2 WORKSHOP EMBEDDE, P1
[7]
HOWARD JD, 1998, TRSAND988667
[8]
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:175-187
[9]
Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313
[10]
Luk M, 2007, PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P479, DOI 10.1109/IPSN.2007.4379708