SAFE: Security-Aware FlexRay Scheduling Engine
Gang Han, Haibo Zeng, Yaping Li, Wenhua Dou. 2014. SAFE: Security-Aware FlexRay Scheduling Engine. Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. :1-4.
View ArticleA unified sequential equivalence checking approach to verify high-level...
Castro Marquez, C.I., Strum, M., Wang Jiang Chau. 2014. A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL...
View ArticleSAFE: Security-Aware FlexRay Scheduling Engine
Gang Han, Haibo Zeng, Yaping Li, Wenhua Dou. 2014. SAFE: Security-Aware FlexRay Scheduling Engine. Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. :1-4.
View ArticleA unified sequential equivalence checking approach to verify high-level...
Castro Marquez, C.I., Strum, M., Wang Jiang Chau. 2014. A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL...
View ArticleA Communication Security Protocol for Ubiquitous Sensor Networks
Sain, M., Bruce, N., Kim, K. H., Lee, H. J.. 2017. A Communication Security Protocol for Ubiquitous Sensor Networks. 2017 19th International Conference on Advanced Communication Technology (ICACT)....
View ArticleCENTRA: CENtrally Trusted Routing vAlidation for IGP
Zeng, H., Wang, B., Deng, W., Gao, X.. 2017. CENTRA: CENtrally Trusted Routing vAlidation for IGP. 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery...
View ArticleThe APT detection method in SDN
Shan-Shan, J., Ya-Bin, X.. 2017. The APT detection method in SDN. 2017 3rd IEEE International Conference on Computer and Communications (ICCC). :1240–1245.
View ArticleAn architecture model for smart city using Cognitive Internet of Things (CIoT)
Patra, M. K.. 2017. An architecture model for smart city using Cognitive Internet of Things (CIoT). 2017 Second International Conference on Electrical, Computer and Communication Technologies...
View ArticleAttack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN...
Sahay, R., Geethakumari, G., Modugu, K.. 2018. Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). :308–313.
View ArticleSEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical...
Höfig, K., Klug, A.. 2018. SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems. 2018 26th International Conference on Software, Telecommunications and...
View ArticleSysTaint: Assisting Reversing of Malicious Network Communications
Viglianisi, Gabriele, Carminati, Michele, Polino, Mario, Continella, Andrea, Zanero, Stefano. 2018. SysTaint: Assisting Reversing of Malicious Network Communications. Proceedings of the 8th Software...
View ArticleBluetooth devices fingerprinting using low cost SDR
Helluy-Lafont, É, Boé, A., Grimaud, G., Hauspie, M.. 2020. Bluetooth devices fingerprinting using low cost SDR. 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). :289—294.
View Article