1 |
Marcusson, Lief, "The Sponsor'S Overview of an it Project, According to it Project Managers Opinion", Journal of Economics and Management Sciences, vol. 1, no. 1, pp. 65-77, May. 2018.
DOI
|
2 |
Snyder, Don et. al., "Cybersecurity of Air Force Weapon Systems: Ensuring Cyber Mission Assurance Throughout a System's Life Cycle", Rand Corporation, Oct. 2015.
|
3 |
Waheed, Mohammed and Michael Cheng, "A system for real-time monitoring of cybersecurity events on aircraft," Digital avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. IEEE, pp.1-3, Nov. 2017.
|
4 |
Koch, Robert and Mario Golling, "Weapons systems and cyber security -a challenging union," 2016 8th interna tional Conference on Cyber Conflict (CyCon), pp. 191-203, June 2016.
|
5 |
Korea Internet & Security Agency, Software Development Security Guide for e-Government SW Developers/Operators, Jan. 2017.
|
6 |
Micro software interactive, micro Software, Testing standards for embedded software, pp. 132-139, June 2011.
|
7 |
Texas Instrument INC, SYS/BIOS (TI-RTOS Kernel) User's Guide, May. 2017.
|
8 |
Wind River Systems INC, vxworks kernel programmers guide 6.2, Oct. 2005.
|
9 |
Parkinson, Paul and Larry Kinnan. "Safety-critical software development for integrated modular avionics." Embedded System Engineering, vol. 11, no. 7, pp. 40-41, 2003
|
10 |
Qian, Hua-ming, and Chun Zheng. "A embedded software testing process model." International Conference on Computational Intelligence and Software Engineering(CiSE) 2009 IEEE, pp. 1-5, Dec. 2009.
|
11 |
Johnson, Leslie A., "DO-178B, Software considerations in airborne systems and equipment certification." Crosstalk, Oct. 1998.
|
12 |
Kowkutla, Venkateswar, and Srivaths Ravi. "Security Standards for Embedded Devices and Systems." Fundamentals of IP and SoC Security. Springer, Cham, pp.295-311, Jan. 2017.
|
13 |
Tsai, Wei-Tek, et al. "Rapid embedded system testing using verification patterns," IEEE software 22.4, pp. 68-75, July 2005.
DOI
|
14 |
Wotzak, William J., and Kenneth P. Fecteau. "Advanced integrated avionics testing system." U.S. Patent No. 5,638,383, June 1997.
|
15 |
Abdelaziz, Adil A., Yaseen El-Tahir, and Raheeg Osman. "Adaptive Software Development for developing safety critical software." 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), pp. 41-46, Sept. 2015.
|
16 |
Cui, Ang, Michael Costello, and Salvatore J. Stolfo. "When Firmware Modifications Attack: A Case Study of Embedded Exploitation." NDSS. pp. 1-13, Feb. 2013.
|
17 |
SJeppu, Yogananda V., Kundapur Karunakar, and P. S. Subramanyam. "Testing safety critical Ada code using non real time testing." International Conference on Reliable Software Technologies. Springer, Berlin, Heidelberg, pp. 382-393, June 2003.
|
18 |
Singh, Raghu. "International Standard ISO/IEC 12207 software life cycle processes." Software Process Improvement and Practice 2.1, pp.35-50, Mar. 1996.
DOI
|
19 |
Director.Operational Test and Evaluation, "Mission Planning Systems (MPS) / Joint Mission Planning System - Air Force (JMPS-AF)", FY 2017 Annual Report, pp.267-268, Mar. 2017.
|
20 |
Foster, John, and Kevin Cunningham, "A GPS-based pitot-static calibration method using global output error optimization." 48th AIAA Aerospace Sciences Meeting Including the New Horizons Forum and Aerospace Exposition, p. 1350, Jan. 2010.
|