共 50 条
- [1] Integrating software specifications into intrusion detection [J]. International Journal of Information Security, 2007, 6 : 345 - 357
- [2] Integrating Types and Specifications for Secure Software Development [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 32 - 35
- [3] Integrating Grid with intrusion detection [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 304 - 309
- [4] Integrating intrusion detection and network management [J]. NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 329 - 344
- [5] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection [J]. 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
- [6] Logic induction of valid behavior specifications for intrusion detection [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 142 - 153
- [8] The best of both worlds integrating UML with Z for software specifications [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 2003, 14 (01): : 8 - 11
- [9] From Intrusion Detection to Software Design [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 1 - 10
- [10] Detection of Malicious Software Engineer Intrusion [J]. 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 565 - 570