, ARP4754A: Guidelines for Development of Civil Aircraft and Systems, SAE International, 2010.
, DO-178C: Software Considerations in Airborne Systems and Equipment Certification, RTCA, 2011.
Integrated Modular Avionics, Proceedings of the IEEE 1992 National Aerospace and Electronics Conference@m_NAECON, vol.1, pp.39-45, 1992. ,
Lessons from Stuxnet, Computer, vol.44, issue.4, pp.91-93, 2011. ,
, Jeep Hacking Incident Leads to Fiat Chrysler Recall of 1.4M Vehicles, 2015.
Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says, Avionics, 2017. ,
Aircraft Hacking-Practical Aero Series, presented at the Hack In The Box (HITB) Conference, 2013. ,
Safety Assurance Contracts for Integrated Modular Avionics, p.10, 2003. ,
ARINC 653 Role in Integrated Modular Avionics (IMA), 2008 IEEE/AIAA 27th Digital Avionics Systems Conference, 1.E.5-1-1.E.5-10, 2008. ,
, Spectre Attacks: Exploiting Speculative Execution *, 2018.
, Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges, vol.18, 2017.
, DO-326A_Airworthiness Security Process Specification, RTCA, 2014.
, DO-356A_Airworthiness Security Methods and Considerations, RTCA, 2018.
Using Model-Based Security Engineering in the Development of Complex Aircraft Cabin Systems, SAE Int. J. Aerosp, vol.8, issue.1, p.2015 ,
, 664P5 Aircraft Data Network, Part 5, Network Domain Characteristics and Interconnection, SAE ITC, October, 2017.
Investigation into a Layered Approach to Architecting Security-Informed Safety Cases, 2015. ,
, Digital Avionics Systems Conference (DASC)
Securing Integrated Modular Avionics Computers, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), pp.4-7, 2013. ,
DOI : 10.1109/dasc.2013.6719660
Protecting Flight Critical Systems against Security Threats in Commercial Air Transportation, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), pp.1-7, 2016. ,
Classification of Intrusion Detection System, International Journal of Computer Applications, vol.118, issue.7, pp.23-26, 2015. ,
The Use of Computational Intelligence in Intrusion Detection Systems: A Review, Applied Soft Computing, vol.10, issue.1, pp.1-35, 2010. ,
Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems, Dependable Computing Conference (EDCC), 2015. ,
DOI : 10.1109/edcc.2015.17
, Eleventh European, IEEE
A Language-Based Intrusion Detection Approach for Automotive Embedded Networks, The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01967640
SecureCore: A Multicore-Based Intrusion Detection Architecture for Real-Time Embedded Systems, Real-Time and Embedded Technology and Applications Symposium (RTAS), 2013 IEEE 19th, pp.21-32, 2013. ,
A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection, Expert Systems with Applications, vol.41, issue.4, pp.1690-1700, 2014. ,
DOI : 10.1016/j.eswa.2013.08.066
A Hybrid System for Reducing the False Alarm Rate of Anomaly Intrusion Detection System, Recent Advances in Information Technology (RAIT), 2012 1st International Conference On, pp.131-136, 2012. ,
Generic and Autonomous System for Airborne Networks Cyber-Threat Detection, 2013. ,
Behavioral Detection of Malware: From a Survey towards an Established Taxonomy, Journal in Computer Virology, vol.4, issue.3, pp.263-70, 2008. ,
DOI : 10.1007/s11416-008-0086-0
Certification Considerations for Adaptive Systems, 2015 International Conference on Unmanned Aircraft Systems (ICUAS), 2015. ,
DOI : 10.1109/icuas.2015.7152300
URL : http://hdl.handle.net/2060/20150005863