共 50 条
- [41] Interoperable Defensive Strategies of Network Security Evaluation [J]. IEEE ACCESS, 2024, 12 : 33959 - 33971
- [42] Security Analysis of Smart Home Implementations [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 450 - 454
- [43] Security Risks in Deep Learning Implementations [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 123 - 128
- [46] Security Analysis on InfiniBand Protocol Implementations [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
- [47] Program Analysis of Cryptographic Implementations for Security [J]. 2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 61 - 68
- [48] On the Security of Partially Masked Software Implementations [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 492 - 499
- [49] A New Security Metric for SOA Implementations [J]. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 103 - 109
- [50] Security management: Targets, essentials and implementations [J]. ADVANCES AND INNOVATIONS IN SYSTEMS, COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2007, : 211 - +