Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Frontmatter
1. Introduction
2. Security Threats in Cyber-Physical Systems
3. Security-Aware Design Methodology
4. Security Mechanisms for CAN Protocol
5. Security-Aware Mapping for CAN-Based Systems
6. Security-Aware Mapping for TDMA-Based Systems
7. Security-Aware Design for V2V Communication
8. FSM-Based Security-Aware Design
9. Graph-Based Security-Aware Design
10. Conclusions
Backmatter
← Prev
Back
Next →
← Prev
Back
Next →