Towards safe and secure autonomous and cooperative vehicle ecosystems
Semi-autonomous driver assists are already widely deployed and fully autonomous cars are
progressively leaving the realm of laboratories. This evolution coexists with a progressive …
progressively leaving the realm of laboratories. This evolution coexists with a progressive …
Embedded systems teaching approaches & challenges
I Ibrahim, R Ali, MZ Adam… - 2014 IEEE 6th Conference …, 2014 - ieeexplore.ieee.org
This paper discusses the challenges of teaching and design of Embedded System course. A
survey on different approaches of teaching embedded systems design course was …
survey on different approaches of teaching embedded systems design course was …
[PDF][PDF] Securing can bus communication: An analysis of cryptographic approaches
JA Bruton - Nat. Univ. Ireland, Galway, 2014 - researchgate.net
In the modern world, the proliferation of computer systems, together with their networking
and interconnection, has created a significant dependence by governments, organizations …
and interconnection, has created a significant dependence by governments, organizations …
[PDF][PDF] Embedded systems pedagogical issue: Teaching approaches, students readiness, and design challenges
This paper discusses the challenges of teaching and design of embedded system course. A
survey on different approaches of teaching embedded systems design course was …
survey on different approaches of teaching embedded systems design course was …
Distorting an adversary's view in cyber-physical systems
In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical
significance as it can be used to manipulate or damage the control operations by …
significance as it can be used to manipulate or damage the control operations by …
Distortion-based lightweight security for cyber-physical systems
In cyber-physical systems (CPS), inference based on communicated data is of critical
significance as it can be used to manipulate or damage the control operations by …
significance as it can be used to manipulate or damage the control operations by …
Architecture des systèmes d'automatisation des postes résiliente aux attaques des trames GOOSE
M Kabir-Querrec, S Mocanu, P Bellemain… - Journées C&ESAR …, 2015 - hal.science
Notre travail concerne la spécification et la mise en oeuvre d'un système d'automatisation
des postes électriques conformes à la norme IEC 61850 capable de fonctionner en …
des postes électriques conformes à la norme IEC 61850 capable de fonctionner en …
Comparison of Real-Time, Mobile Data Bus Architectures
PM Simon, SR Graham - 2016 IEEE 17th International …, 2016 - ieeexplore.ieee.org
Modern aircraft and automobiles are equipped with sensors, actuators, and controllers
which generate or consume data during operations to improve the performance and life …
which generate or consume data during operations to improve the performance and life …
Defending Vehicles Against Cyberthreats: Challenges and a Detection-Based Solution
Q Liu - 2021 - scholarworks.sjsu.edu
The lack of concern with security when vehicular network protocols were designed some
thirty years ago is about to take its toll as vehicles become more connected and smart …
thirty years ago is about to take its toll as vehicles become more connected and smart …
[图书][B] Application-Tailored Security: Lessons from Theory to Practice
M Karmoose - 2019 - search.proquest.com
With the increase of inter-connected devices, it is of paramount importance to ensure the
security of the exchanged information. While cryptographic techniques provide tools to …
security of the exchanged information. While cryptographic techniques provide tools to …