共 50 条
- [42] A Methodology to build run-time Monitors for Security-Aware Workflows [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 501 - +
- [43] Run-Time Security and Safety Management in Adaptive Smart Work Environments [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 256 - 261
- [44] Towards Security Case Run-time Adaptation by System Decomposition into Services [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 4102 - 4108
- [45] Detect Compiler Inserted Run-time Security Checks in Binary Software [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 268 - 286
- [47] AC-contract: Run-time verification of context-aware applications [J]. 2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS, 2015, : 24 - 34
- [49] Architectural design, behavior modeling and run-time verification of network embedded systems [J]. RELIABLE SYSTEMS ON UNRELIABLE NETWORKED PLATFORMS, 2007, 4322 : 281 - 303
- [50] Behavioral modeling and run-time verification of system-of-systems architectural requirements [J]. INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 6, POST-CONFERENCE ISSUE, PROCEEDINGS, 2004, : 13 - 18