压倒 发表于 2025-3-25 06:13:36
http://reply.papertrans.cn/24/2338/233719/233719_21.png灵敏 发表于 2025-3-25 11:20:42
Limitation and Improvement of STPA-Sec for Safety and Security Co-analysisof high level security scenarios. We evaluate the feasibility of the improved co-analysis method in a self-optimizing battery management system. We also discuss the general applicability of STPA-Sec to high level safety and security analysis and the relation to automotive cybersecurity standards.民间传说 发表于 2025-3-25 14:14:09
Security Services for Mixed-Criticality Systems Based on Networked Multi-core Chips provide secure communication, time synchronization and resource management for the architecture. This paper defines the required security properties to harden the DREAMS architecture against malicious attacks. The security properties are mapped to concrete security services that serve as basis forIndividual 发表于 2025-3-25 16:42:54
http://reply.papertrans.cn/24/2338/233719/233719_24.png到婚嫁年龄 发表于 2025-3-25 22:53:48
http://reply.papertrans.cn/24/2338/233719/233719_25.pngCustodian 发表于 2025-3-26 03:58:02
http://reply.papertrans.cn/24/2338/233719/233719_26.png神圣在玷污 发表于 2025-3-26 07:47:56
A Defense of the Bayesian Choice, possible to increase speed and robustness by using Time-of-Flight 3D image sensors for communication. Finally, we show how communication partners can be localized and how location-aware communication can greatly benefit secured communication by mitigating relay and denial-of-service attacks.Repatriate 发表于 2025-3-26 09:15:40
http://reply.papertrans.cn/24/2338/233719/233719_28.png地牢 发表于 2025-3-26 13:33:24
http://reply.papertrans.cn/24/2338/233719/233719_29.png宿醉 发表于 2025-3-26 19:39:19
https://doi.org/10.1007/978-3-319-45480-1cyber-physical systems; embedded systems; internet of things; quality of service; systems modeling; authe