Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems.
Monowar HasanSibin MohanRakesh B. BobbaRodolfo PellizzoniPublished in: RTSS (2016)
Keyphrases
- access control
- information security
- network security
- security issues
- intrusion detection
- security requirements
- statistical databases
- information assurance
- computer security
- security mechanisms
- security policies
- data flow
- security systems
- data sets
- smart card
- sensor networks
- neural network
- security model
- security level
- security threats