共 50 条
- [1] Secure Component Based Applications Through Security Patterns [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
- [3] Applying Security Patterns for authorization of users in IoT Based Applications [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING & EMERGING TECHNOLOGIES (ICEET), 2018, : 77 - 81
- [4] Characterising Embedded Applications using a UML Profile [J]. 2009 INTERNATIONAL SYMPOSIUM ON SYSTEM-ON-CHIP PROCEEDINGS, 2009, : 172 - +
- [5] UML Profile for IoT-Based Applications [J]. ADVANCES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022, 2022, 1653 : 515 - 527
- [6] Support Formal Component-based Development with UML Profile [J]. 2013 22ND AUSTRALASIAN CONFERENCE ON SOFTWARE ENGINEERING (ASWEC), 2013, : 191 - 200
- [7] Security requirement with a UML 2.0 profile [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 670 - +
- [8] Understanding Web Applications Using Component Based Visual Patterns [J]. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION ICPC 2015, 2015, : 281 - 284
- [9] Visualizing design patterns with a UML profile [J]. 200S IEEE SYMPOSIUM ON HUMAN CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, 2003, : 123 - 125
- [10] Applying the UML performance profile: Graph grammar-based derivation of LQN models from UML specifications [J]. COMPUTER PERFORMANCE EVALUATION: MODELLING TECHNIQUES AND TOOLS, 2002, 2324 : 159 - 177