1. Kang, K., Son, S.: Systematic security and timeliness tradeoffs in real-time embedded systems. In: Proceedings-12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2006, pp. 183–189 (2006)
2. Hwang, D.D., Schaumont, P., Tiri, K., Verbauwhede, I.: Securing embedded systems. IEEE Security & Privacy 4(2) (2006)
3. Zhao, G., Zhang, G., Yao, A.: Research of Mechanism to System Flexibility Based on Embedded Real-time System. In: 2010 International Conference on Advanced Measurement and Test, AMT 2010 (2010)
4. Ravindran, K., Kwiat, K.A., Sabbir, A.: Adapting distributed voting algorithms for secure real-time embedded systems. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (2004)
5. William Beck, R., Mark Vanfleet, W.: High Assurance Security/Safety For Deeply Embedded, Real-time Systems. In: 2006 Embedded Systems Conference - Silicon Valley (ESC 2006) (2006)