共 50 条
- [1] Model-based security engineering [J]. ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS23 - IS29
- [2] Model-based security engineering [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS23 - IS29
- [3] Model-based security engineering [J]. WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS23 - IS29
- [4] Model-based security engineering with UML [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 42 - 77
- [5] Model-based security engineering for real [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 600 - 606
- [6] WorSE: A Workbench for Model-based Security Engineering [J]. COMPUTERS & SECURITY, 2014, 42 : 40 - 55
- [7] Security & Safety by Model-based Requirements Engineering [J]. 2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
- [8] Model-based security engineering with UML:: Introducing security aspects [J]. FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2006, 4111 : 64 - 87
- [9] Towards Language Support for Model-based Security Policy Engineering [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 513 - 521
- [10] Model-based security testing Deriving test models from artefacts of security engineering [J]. 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, : 244 - 251