Name
Papers
Collaborators
GEDARE BLOOM
32
59
Citations 
PageRank 
Referers 
68
13.95
163
Referees 
References 
548
230
Search Limit
100548
Title
Citations
PageRank
Year
Poster: Toward Zero-Trust Path-Aware Access Control00.342022
Reverse Engineering Controller Area Network Messages Using Unsupervised Machine Learning00.342022
Strong APA scheduling in a real-time operating system: work-in-progress00.342021
Precise Cache Profiling for Studying Radiation Effects00.342021
SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing40.392020
Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard00.342020
Event Notification in CAN-based Sensor Networks00.342019
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery00.342019
Comparison of file systems in RTEMS00.342019
Survey of Automotive Controller Area Network Intrusion Detection Systems40.532019
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network.20.382019
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes.20.352019
Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network00.342018
The future of IoT security: special session.00.342018
Aligning Deos and RTEMS with the FACE Safety Base Operating System Profile.00.342018
Towards A Provenance Collection Framework For Internet Of Things Devices00.342017
n-Modular Redundant Real-Time Middleware: Design and Implementation.10.342016
SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems10.352016
LockDown: an operating system for achieving service continuity by quarantining principals.00.342016
Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder.10.352016
CBufs: efficient, system-wide memory management and sharing.10.352016
Hardware-enhanced distributed access enforcement for role-based access control00.342014
Scheduling and thread management with RTEMS40.802014
Hardware and software support for fine-grained memory access control and encapsulation in C++00.342013
PyLOM: a language and run-time system for planning applications00.342013
Shared hardware data structures for hard real-time systems80.572012
No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains10.482012
Automation for Creating and Configuring Security Manifests for Hardware Containers.00.342011
OS support for detecting Trojan circuit attacks191.552009
Hardware-enforced fine-grained isolation of untrusted code30.422009
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems40.432009
Providing secure execution environments with a last line of defense against Trojan circuit attacks130.912009