共 42 条
- [1] SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 659 - 673
- [2] Towards Independent Run-time Cloud Monitoring [J]. COMPANION OF THE ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING, ICPE 2021, 2021, : 21 - 26
- [3] Design for Run-Time Monitor on Cloud Computing [J]. SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 279 - +
- [4] Design-Time to Run-Time Verification of Microservices Based Applications (Short Paper) [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2017, 2018, 10729 : 168 - 173
- [5] Run-Time Security Traceability for Evolving Systems [J]. COMPUTER JOURNAL, 2011, 54 (01): : 58 - 87
- [6] An Ontology for run-time Verification of Security Certificates for SOA [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 525 - 533
- [7] Run-time security evaluation (RTSE) for distributed applications [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 222 - 232
- [8] Analysis and run-time verification of dynamic security policies [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103
- [9] Run-time Selection of Security Algorithms For Networked Devices [J]. Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96