{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T05:59:30Z","timestamp":1742795970627,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8714888","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T17:29:07Z","timestamp":1558027747000},"page":"1222-1227","source":"Crossref","is-referenced-by-count":36,"title":["A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems"],"prefix":"10.23919","author":[{"given":"Jiyang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jen-Yang","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2016.17"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461456"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2009.20"},{"key":"ref10","first-page":"139","article-title":"Implementing selinux as a linux security module","volume":"1","author":"smalley","year":"2001","journal-title":"NAI Labs Report"},{"key":"ref11","first-page":"355","article-title":"Subdomain: Parsimonious server security","author":"cowan","year":"2000","journal-title":"LISA"},{"article-title":"Seccomp: Towards practically defending against component hijacking in android applications","year":"2016","author":"wu","key":"ref12"},{"article-title":"Analysis of docker security","year":"2015","author":"bui","key":"ref13"},{"key":"ref14","first-page":"20","article-title":"Using simplicity to control complexity","author":"sha","year":"2001","journal-title":"IEEE Software"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref16","article-title":"A survey on security isolation of virtualization, containers, and unikernels","author":"de lucia","year":"2017","journal-title":"US Army Research Laboratory Aberdeen Proving Ground United States Tech Rep"},{"article-title":"Deeppicar: A low-cost deep neural network-based autonomous car","year":"2017","author":"bechtel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6925986"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2014.6871199"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.123"},{"key":"ref4","article-title":"Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing","author":"senie","year":"1998","journal-title":"Network"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"year":"0","key":"ref6","article-title":"Docker"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ADA373286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010241"},{"key":"ref8","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux Journal"},{"key":"ref7","first-page":"55","article-title":"Memguard: Memory bandwidth reservation system for efficient performance isolation in multi-core platforms","author":"yun","year":"2013","journal-title":"Real-Time and Embedded Technology and Applications Symposium (RTAS) 2013 IEEE 19th"},{"year":"0","key":"ref2","article-title":"Hijacking drones with a MAVLink exploit"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2015.7432984"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1_95"},{"year":"0","key":"ref20","article-title":"Emlid Navio2"},{"article-title":"ViconMAVLink: A software tool for indoor positioning using a motion capture system","year":"2018","author":"liu","key":"ref22"},{"year":"0","key":"ref21","article-title":"PX4 Development Guide"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.67"},{"year":"0","key":"ref23","article-title":"QEMU: the FAST processor emulator"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref25","article-title":"Container based virtualisation for software deployment in self-driving vehicles","author":"masek","year":"2006","journal-title":"Master thesis dissertation"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08714888.pdf?arnumber=8714888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T19:51:06Z","timestamp":1559591466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8714888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8714888","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}