共 50 条
- [2] Towards a Reliable Mapping between Performance and Security Tactics, and Architectural Patterns [J]. PROCEEDINGS OF THE 20TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2015), 2015,
- [3] Identifying Availability Tactics to Support Security Architectural Design of Microservice-based Systems [J]. 13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 123 - 129
- [4] Analysing Tactics in Architectural Patterns [J]. PROCEEDINGS OF THE 2012 IEEE 35TH SOFTWARE ENGINEERING WORKSHOP (SEW 2012), 2012, : 32 - 41
- [5] Understanding Software Vulnerabilities Related to Architectural Security Tactics An Empirical Investigation of Chromium, PHP and Thunderbird [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2017), 2017, : 69 - 78
- [6] On Architectural Qualities and Tactics for Mobile Sensing [J]. QOSA'15 PROCEEDINGS OF THE 11TH INTERNATIONAL ACM SIGSOFT CONFERENCE ON QUALITY OF SOFTWARE ARCHITECTURES, 2015, : 63 - 72
- [9] Towards automation of performance architectural tactics application [J]. 2011 9TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2011, : 157 - 160
- [10] A Catalog of Architectural Tactics for Cyber-Foraging [J]. QOSA'15 PROCEEDINGS OF THE 11TH INTERNATIONAL ACM SIGSOFT CONFERENCE ON QUALITY OF SOFTWARE ARCHITECTURES, 2015, : 53 - 62