1. Security in embedded systems: Design challenges;Ravi;ACM Trans. Embed. Comput. Syst.,2004
2. An overview of repository technology;Bernstein,1994
3. A reuse repository system: From specification to deployment;Burégio,2008
4. TERESA, TERESA Project, Trusted Computing Engineering for Resource Constrained Embedded Systems Applications, http://www.teresa-project.org/.
5. Model-driven engineering;Schmidt;IEEE comput.,2006