共 50 条
- [41] Behavioral Patterns in Security Applications [J]. 2017 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2017, : 122 - 125
- [42] Towards practical security monitors of UML policies for mobile applications [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1112 - 1119
- [43] The Reality of Applying Security in Web Applications in Education [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 997 - 1001
- [44] Enforcing Component Dependency in UML Deployment Diagram for Cloud Applications [J]. 2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 412 - 417
- [46] Using UML-based feature models and UML collaboration diagrams to information modelling for web-based applications [J]. UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 425 - 439
- [47] A proposal for goal modelling using a UML profile [J]. ENTERPRISE INTEROPERABILITY III: NEW CHALLENGES AND INDUSTRIAL APPROACHES, 2008, : 679 - +
- [49] Refinement Based Modeling of Workflow Applications using UML Activity Diagrams [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 187 - 192
- [50] Introducing UML profile for modelling information architecture of Web applications [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 245 - 250