共 50 条
- [1] Automotive security demands an infinite software development lifecycle [J]. Pitchford, Mark, 2018, Hearst Business Communications (60):
- [2] Security-driven exploration of cryptography in DSP cores [J]. ISSS'02: 15TH INTERNATIONAL SYMPOSIUM ON SYSTEM SYNTHESIS, 2002, : 80 - 85
- [3] Semantic Security: Specification and Enforcement of Semantic Policies for Security-driven Collaborations [J]. HEALTHGRID RESEARCH, INNOVATION AND BUSINESS CASE, 2009, 147 : 201 - +
- [5] Cloud services security-driven evaluation for multiple tenants [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1103 - 1121
- [6] Towards Evaluation of Security Assurance during the Software Development Lifecycle [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 817 - 822
- [7] Safety and security-driven design of networked embedded systems [J]. DSD 2007: 10TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, 2007, : 420 - 423
- [8] Security-driven scheduling algorithms based on Eigentrust in Grid [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 1068 - 1072
- [9] Security-Driven Task Scheduling Based on Evolutionary Algorithm [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1012 - 1017
- [10] Cloud services security-driven evaluation for multiple tenants [J]. Cluster Computing, 2021, 24 : 1103 - 1121