122 references, page 1 of 9
[1] E. Lee and S. Seshia, Introduction to Embedded Systems - A CyberPhysical Systems Approach, 1st ed. Lee and Seshia, 2010.
[2] A. Ca´rdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” in Proceedings of the 3rd Conference on Hot Topics in Security, ser. HOTSEC'08. Berkeley, CA, USA: USENIX Association, 2008, pp. 6:1-6:6.
[3] R. Poovendran, “Cyber-physical systems: Close encounters between two parallel worlds [Point of View],” Proceedings of the IEEE, vol. 98, no. 8, pp. 1363-1366, August 2010. [OpenAIRE]
[4] E. Lee, “Computing foundations and practice for cyber-physical systems: A preliminary report,” University of California, Berkeley, Tech. Rep. UCB/EECS-2007-72, May 2007.
[5] President's Council of Advisors on Science and Technology, “Report to the President and Congress: Designing a digital future: Federally funded research and development in networking and information technology,” December 2010.
[6] National Science Foundation, “Cyber-physical systems program solicitation NSF 13-502,” October 2012.
[7] E. Lee, “Cyber physical systems: Design challenges,” in ISORC, 2008, pp. 363-369.
[8] --, “CPS foundations,” in DAC, 2010, pp. 737-742.
[9] K. Petersen, S. Vakkalanka, and L. Kuzniarz, “Guidelines for conducting systematic mapping studies in software engineering: An update,” Information and Software Technology, vol. 64, pp. 1-18, 2015.
[10] B. Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” Keele University and University of Durham, Tech. Rep. EBSE-2007-01, 2007.
[11] N. Wiener, Cybernetics or Control and Communication in the Animal and the Machine. MIT press, 1965, vol. 25.
[12] A. Ca´rdenas, S. Amin, and S. Sastry, “Secure control: Towards survivable cyber-physical systems,” in Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, June 2008, pp. 495-500.
[13] N. Institute of Standards and Technology (NIST), “Strategic vision and business drivers for 21st century cyber-physical systems,” January 2013.
[14] R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, “Cyber-physical systems: The next computing revolution,” in Proceedings of the 47th Design Automation Conference, ser. DAC '10. ACM, 2010, pp. 731-736.
[15] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, “Experimental security analysis of a modern automobile,” in Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010, pp. 447- 462.
122 references, page 1 of 9