共 50 条
- [1] Model-based security engineering with UML:: Introducing security aspects [J]. FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2006, 4111 : 64 - 87
- [2] Sound methods and effective tools for model-based security engineering with UML [J]. ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 322 - 331
- [3] Model-based security engineering [J]. ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS23 - IS29
- [4] Model-based security engineering [J]. SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS23 - IS29
- [5] Model-based security engineering [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS23 - IS29
- [6] Model-based security engineering [J]. WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS23 - IS29
- [7] Model-based security engineering for real [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 600 - 606
- [8] WorSE: A Workbench for Model-based Security Engineering [J]. COMPUTERS & SECURITY, 2014, 42 : 40 - 55
- [9] Security & Safety by Model-based Requirements Engineering [J]. 2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
- [10] MoMuT::UML Model-based Mutation Testing for UML [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2015,