共 50 条
- [21] The influence of a security kernel architecture on the structure of operating systems IT - Information Technology, 1980, 22 (01): : 173 - 179
- [22] A security verification method for information flow security policies implemented in operating systems INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 280 - 291
- [23] Network security: Then and now or 20 years in 10 minutes PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 117 - 117
- [24] THE SOCIAL-SECURITY ACT - 20 YEARS EXPERIENCE JOURNAL OF ACCOUNTANCY, 1956, 102 (02): : 27 - 34
- [25] 20 YEARS EXPERIENCE OPERATING THORACIC AORTIC-ANEURYSMS LANGENBECKS ARCHIV FUR CHIRURGIE, 1990, : 475 - 480
- [26] ONLINE DYNAMIC TESTING OF SECURITY AND INTEGRITY OF OPERATING SYSTEMS. IBM Technical Disclosure Bulletin, 1974, 17 (05): : 1508 - 1512
- [27] Modelling security risks in real-time operating systems 2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
- [28] An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper) TOWARDS A SERVICE-BASED INTERNET, 2011, 6994 : 112 - +
- [29] A Survey on Resource Management and Security Issues in IoT Operating Systems 2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 26 - 30
- [30] A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 404 - 409