Author:
Smita Sudhakar Palnitkar ,Sudhir Kanade
Reference26 articles.
1. Jeong, S., Jeon, B., Chung, B., and Kim, H.K., Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks, Veh. Commun., 2021, vol. 29, p. 100338.
2. Karcher, N., Gebauer, R., Bauknecht, R., Illichmann, R., and Sander, O., Versatile configuration and control framework for real-time data acquisition systems, IEEE Trans. Nucl. Sci., 2021, vol. 68, no. 8, pp. 1899–1906.
3. Chen, M., Zhang, Z., and Ren, H., Design and verification of high-performance memory interface based on AXI bus, in 2021 IEEE 21st International Conference on Communication Technology (ICCT), 2021, pp. 695–699.
4. Mancini, T., Melatti, I., and Tronci, E., Any-horizon uniform random sampling and enumeration of constrained scenarios for simulation-based formal verification, IEEE Trans. Software Eng., 2021.
5. Restuccia, F., Meza, A., and Kastner, R., AKER: A Design and Verification Framework for Safe and Secure SoC Access Control, arXiv preprint arXiv:2106.13263, 2021.