共 27 条
[13]
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
[14]
Experimental Security Analysis of a Modern Automobile
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:447-462
[17]
Mancuso R, 2013, IEEE REAL TIME, P45, DOI 10.1109/RTAS.2013.6531078
[18]
Real-Time Systems Security Through Scheduler Constraints
[J].
2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014),
2014,
:129-+
[19]
Pellizzoni R, 2015, 21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), P271, DOI 10.1109/RTAS.2015.7108450
[20]
Tightening the bounds on feasible preemption points
[J].
27TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS,
2006,
:212-+