共 50 条
- [31] The Security Policy Application Process: Action Research [J]. NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2016, 445 : 353 - 362
- [32] Data Security Issues in the Process of Applying Cloud Computing [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, KNOWLEDGE ENGINEERING AND INFORMATION ENGINEERING (SEKEIE 2014), 2014, 114 : 135 - 138
- [33] NON-TRADITIONAL SECURITY ISSUES IN ASEAN: Agendas for Action [J]. PACIFIC AFFAIRS, 2021, 94 (01) : 184 - 186
- [35] A subrecursive refinement of the fundamental theorem of algebra [J]. LOGICAL APPROACHES TO COMPUTATIONAL BARRIERS, PROCEEDINGS, 2006, 3988 : 435 - 444
- [36] Refinement algebra for formal bytecode generation [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 347 - 358
- [37] Reactive probabilistic programs and refinement algebra [J]. RELATIONS AND KLEENE ALGEBRA IN COMPUTER SCIENCE, 2008, 4988 : 304 - 319
- [38] Refinement algebra with operators for enabledness and termination [J]. MATHEMATICS OF PROGRAM CONSTRUCTION, 2006, 4014 : 397 - 415
- [39] Action abstraction in timed process algebra - The case for an untimed silent step [J]. INTERNATIONAL SYMPOSIUM ON FUNDAMENTALS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4767 : 287 - +
- [40] Analyzing Security Breaches of Countermeasures Throughout the Refinement Process in Hardware Design Flow [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1129 - 1134