共 50 条
- [41] A Review Paper : Security Requirement Patterns for a Secure Software Development [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 146 - 151
- [43] Security by Design factors for developing and evaluating secure software [J]. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
- [44] Applying The Flask Security Architecture to Secure SoC Design [J]. 2017 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2017), 2017, : 198 - 198
- [45] Design and implementation of integrated security engine for secure networking [J]. 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 480 - 484
- [46] Design and implementation of secure Linux kernel security functions [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (10):
- [48] Security design patterns:: Survey and evaluation [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 2086 - +
- [49] SYSTEMS OF SECURE PAYMENT. SECURITY IN ELECTRONIC COMMERCE [J]. REVISTA DE ESTUDIOS EMPRESARIALES-SEGUNDA EPOCA, 2009, (01): : 63 - 76
- [50] Towards Design Patterns for Production Security [J]. 2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,