The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks |
Park, Soo-Youl
(부산대학교 IT응용공학과)
Choi, Wook-Jin (부산대학교 IT응용공학과) Chung, Bo-Heung (한국전자통신연구원) Kim, Jeong-Nyeo (한국전자통신연구원) Kim, Joo-Man (부산대학교 IT응용공학과) |
1 | L. Sha, T. Abdelzaher, K.E. Arzen, A. Cervin, T. Baker, A. Burns, G. Buttazzo, M. Caccamo, J. Lehoczky, A.K. Mok, "Real time scheduling theory: A historical perspective," Journal Real-Time Systems, Vol. 28, No. 2, pp101-155, 2004. DOI |
2 | N. Navet, F. Simonot-Lion, "Automotive Embedded Systems Handbook," CRC Press, 2009. |
3 | A. Banerjee, K.K. Venkatasubramanian, T. Mukherjee, S.K.S. Gupta, "Ensuring Safety, Security and Sustainability of Mission-Critical Cyber Physical Systems," Proceedings on the IEEE, Vol 100, No. 1, pp.283-299, 2012. DOI |
4 | www.aadl.info |
5 | S.K.S Gupta, T. Mukherjee, G. Varsamopoulos, A. Banerjee, "Research directions in energy-sustainable cyber-physical systems," Sustainable Computing: Informatics and Systems, Vol. 1, No. 1, pp.57-74 , 2011. DOI ScienceOn |
6 | M. McDonald, J. Mulder, B. Richardson, R. Cassidy, A. Chavez, N. Pattengale, et. al., "Modeling and Simulation for Cyber-physical System Security Research, Development and Applications," Sandia National Laboratories, Tech. Rep. Sandia Report SAND2010-0568, 2010. |
7 | E.A. Lee, "Computing Foundations and Practice for Cyber-Physical Systems: A Preliminary Report," Technical Report No. UCB/EECS-2007-72, Electrical Engineering and Computer Sciences, University of California at Berkeley, 2007. |
8 | H. Kopetz, "Real-Time Systems - Design Principles for Distributed Embedded Applications," Springer, 2011. |
9 | K. Stouffer, J. Falco, K Scarfone, "Guide to Industrial Control Systems (ICS) Security," National Institute of Standards and Technology (NIST), 2011. |
10 | N. Falliere, L.O. Murchu, E. Chien, "W32. stuxnet dossier," White paper, Symantec Corp., Security Response, 2011. |
11 | G.N. Ericsson, "Cyber security and power system communication-Essential parts of a smart grid infrastructure," IEEE Transactions on Power Delivery, Vol. 25, No. 3, pp.1507-1507, 2010. |
12 | Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel and others, "Experimental Security Analysis of a Modern Automobil,e" Proceedings on IEEE Symposium on Security and Privacy, pp.447-462, 2010. |
13 | www.isssource.com/stuxnet-report-ii-a-worm% E2%80%99s-life/ |
14 | A.A. Cardenas, S. Amin, S. Sastry, "Secure Control: Towards Survivable Cyber-Physical Systems," Proceedings on ICDCS'08, pp.495-500, 2009. |
15 | J. Hugues, B. Zalila, L. Pautet, F. Kordon, "Rapid prototyping of distributed real-time embedded systems using the aadl and ocarina," Proceedings on RSP'07, pp.106-112, 2007. |
16 | 조수연, 김남진, 이은령, 김재영, 김주만, "자동차 전장 시스템에서 주기 및 비주기 태스크를 위한 실시간 스케줄링," 대한임베디드공학회논문지, Vol. 6, No. 02, pp.55-61, 2011. |