共 19 条
[1]
[Anonymous], 2017, International Journal of Hybrid Intelligent Systems, DOI DOI 10.3233/HIS-170247
[2]
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[3]
Christodorescu Mihai, 2008, 1st India Software Engineering Conference. ISEC 2008, P5
[4]
Attack Injection into Avionic Systems through Application Code Mutation
[J].
2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC),
2019,
[5]
Implementation of a Host-based Intrusion Detection System for Avionic Applications
[J].
2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019),
2019,
:178-187
[8]
Dosilovic FK, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P210, DOI 10.23919/MIPRO.2018.8400040
[9]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[10]
Fumera G, 2002, LECT NOTES COMPUT SC, V2388, P68