Author:
Chekole Eyasu Getahun,Chattopadhyay Sudipta,Ochoa Martín,Huaqun Guo
Publisher
Springer International Publishing
Reference46 articles.
1. Sha, L., Gopalakrishnan, S., Liu, X., Wang, Q.: Cyber-physical systems: a new frontier. In: SUTC 2008 (2008)
2. Lee, E.A., Seshia, S.A.: Introduction to Embedded Systems - A Cyber-Physical Systems Approach, 2nd edn, version 2.0 edn. LeeSeshia.org (2015)
3. Lee, E.A.: Cyber physical systems: design challenges. In: ISORC 2008 (2008)
4. MITRE: Common Vulnerabilities and Exposures.
https://cve.mitre.org/
5. CVE-5814.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5814
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Self-supervised Deep Learning Based End-to-End Face Verification Method using Siamese Network;2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI);2023-12-11
2. VulnGen: Vulnerable Virtual Machine Generator;2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI);2023-12-11
3. Nearest Neighbor Based Unsupervised Deep Learning Image Recognition Method;2023 International Conference on Modeling, Simulation & Intelligent Computing (MoSICom);2023-12-07
4. EARIC: Exploiting ADC Registers in IoT and Control Systems;Lecture Notes in Computer Science;2023
5. DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem;2021 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI);2021-12-11