Author of the publication

Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks.

, , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair Channel Access in Cooperative Vehicle Safety Systems., , , , and . J. Inf. Sci. Eng., 32 (5): 1219-1240 (2016)Multiagent Learning of Coordination in Loosely Coupled Multiagent Systems., , , and . IEEE Trans. Cybern., 45 (12): 2853-2867 (2015)Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks., , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)Real-Time Scheduling of Autonomous Driving System with Guaranteed Timing Correctness., , , , , , and . RTAS, page 185-197. IEEE, (2023)Response Time Analysis for Prioritized DAG Task with Mutually Exclusive Vertices., , , , , , and . RTSS, page 460-473. IEEE, (2022)A Service-Oriented Framework for Traffic Information Grid., , and . SAG, volume 3458 of Lecture Notes in Computer Science, page 197-206. Springer, (2004)A Cutting Plane Heuristic Algorithm for the Time Dependent Chinese Postman Problem., , and . FAW-AAIM, volume 7924 of Lecture Notes in Computer Science, page 163-174. Springer, (2013)An Integer Programming Approach for the Rural Postman Problem with Time Dependent Travel Times., and . COCOON, volume 6842 of Lecture Notes in Computer Science, page 414-431. Springer, (2011)Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms., , , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 184-191. Springer, (2005)A Message-based Software Architecture Style for Distributed Application., , , , and . PDCAT, page 583-585. IEEE Computer Society, (2005)