共 27 条
- [13] Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
- [14] Experimental Security Analysis of a Modern Automobile [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 447 - 462
- [17] Mancuso R, 2013, IEEE REAL TIME, P45, DOI 10.1109/RTAS.2013.6531078
- [18] Real-Time Systems Security Through Scheduler Constraints [J]. 2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, : 129 - +
- [19] Pellizzoni R, 2015, 21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), P271, DOI 10.1109/RTAS.2015.7108450
- [20] Tightening the bounds on feasible preemption points [J]. 27TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2006, : 212 - +