Quantcast
Channel: CPS-VO - communication protocol
Browsing all 12 articles
Browse latest View live

SAFE: Security-Aware FlexRay Scheduling Engine

Gang Han, Haibo Zeng, Yaping Li, Wenhua Dou.  2014.  SAFE: Security-Aware FlexRay Scheduling Engine. Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. :1-4.

View Article



A unified sequential equivalence checking approach to verify high-level...

Castro Marquez, C.I., Strum, M., Wang Jiang Chau.  2014.  A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL...

View Article

SAFE: Security-Aware FlexRay Scheduling Engine

Gang Han, Haibo Zeng, Yaping Li, Wenhua Dou.  2014.  SAFE: Security-Aware FlexRay Scheduling Engine. Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014. :1-4.

View Article

A unified sequential equivalence checking approach to verify high-level...

Castro Marquez, C.I., Strum, M., Wang Jiang Chau.  2014.  A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL...

View Article

A Communication Security Protocol for Ubiquitous Sensor Networks

Sain, M., Bruce, N., Kim, K. H., Lee, H. J..  2017.  A Communication Security Protocol for Ubiquitous Sensor Networks. 2017 19th International Conference on Advanced Communication Technology (ICACT)....

View Article


CENTRA: CENtrally Trusted Routing vAlidation for IGP

Zeng, H., Wang, B., Deng, W., Gao, X..  2017.  CENTRA: CENtrally Trusted Routing vAlidation for IGP. 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery...

View Article

The APT detection method in SDN

Shan-Shan, J., Ya-Bin, X..  2017.  The APT detection method in SDN. 2017 3rd IEEE International Conference on Computer and Communications (ICCC). :1240–1245.

View Article

An architecture model for smart city using Cognitive Internet of Things (CIoT)

Patra, M. K..  2017.  An architecture model for smart city using Cognitive Internet of Things (CIoT). 2017 Second International Conference on Electrical, Computer and Communication Technologies...

View Article


Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN...

Sahay, R., Geethakumari, G., Modugu, K..  2018.  Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). :308–313.

View Article


SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical...

Höfig, K., Klug, A..  2018.  SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems. 2018 26th International Conference on Software, Telecommunications and...

View Article

SysTaint: Assisting Reversing of Malicious Network Communications

Viglianisi, Gabriele, Carminati, Michele, Polino, Mario, Continella, Andrea, Zanero, Stefano.  2018.  SysTaint: Assisting Reversing of Malicious Network Communications. Proceedings of the 8th Software...

View Article

Bluetooth devices fingerprinting using low cost SDR

Helluy-Lafont, É, Boé, A., Grimaud, G., Hauspie, M..  2020.  Bluetooth devices fingerprinting using low cost SDR. 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). :289—294.

View Article
Browsing all 12 articles
Browse latest View live


Latest Images