共 50 条
- [1] Benchmarking user-defined security configuration of mobile devices [J]. 2016 SEVENTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2016, : 172 - 175
- [2] FABLE: A language for enforcing user-defined security policies [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 369 - 383
- [3] User-defined data types and operators in occam [J]. ARCHITECTURES, LANGUAGES AND TECHNIQUES FOR CONCURRENT SYSTEMS, 1999, 57 : 121 - 146
- [4] Adequacy of a User-Defined Vocabulary to the Data Structure [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ - IEEE 2013), 2013,
- [5] Supporting User-Defined Functions on Uncertain Data [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (06): : 469 - 480
- [6] User-defined Instrument [J]. PROCEEDINGS OF THE 2016 JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING, 2016, 59 : 560 - 563
- [8] Risk Assessment of User-Defined Security Configurations for Android Devices [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 467 - 477
- [9] A Framework for Managing User-defined Security Policies to Support Network Security Functions [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2018), 2018,
- [10] Data Recovery of User-defined Procedures in Binary Translation [J]. PROCEEDINGS OF THE 2013 6TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI 2013), VOLS 1 AND 2, 2013, : 634 - 638