共 50 条
- [41] iOS Encryption Systems Deploying iOS Devices in Security-critical Environments [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 170 - 182
- [42] Risk-driven development of security-critical systems using UMLsec [J]. INFORMATION TECHNOLOGY: SELECTED TUTORIALS, 2004, 157 : 21 - 53
- [43] Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2579 - 2595
- [46] Abstracting Security-Critical Applications for Model Checking in a Model-Driven Approach [J]. PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 11 - 14
- [47] Safety Critical Software and Security - How Low Can You Go? [J]. 2018 IEEE/AIAA 37TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2018, : 210 - 215
- [48] Model Checking of Security-Critical Applications in a Model-Driven Approach [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 76 - 90
- [49] Generating Formal Specifications for Security-Critical Applications - A Model-Driven Approach [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 68 - 74
- [50] A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18), 2018, : 59 - 68