共 50 条
- [41] OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 1 - 10
- [43] Analyzing security and energy tradeoffs in autonomic capacity management [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 302 - 309
- [44] Multi-agent systems and security requirements analysis [J]. SOFTWARE ENGINEERING FOR MULTI-AGENT SYSTEMS II: RESEARCH ISSUES AND PRACTICAL APPLICATIONS, 2004, 2940 : 35 - 48
- [45] AMSEP: Automated Multi-level Security Management for Multimedia Event Processing [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 452 - 457
- [46] Enhancing Security of the Android Platform via Multi-level Security Model [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 13 - 24
- [47] Security requirements for management systems using mobile agents [J]. IEEE Symposium on Computers and Communications - Proceedings, 2000, : 160 - 165
- [48] Supporting Security Requirements for Resource Management in Cloud Computing [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 170 - 177
- [49] Security requirements model for grid data management systems [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 30 - 41
- [50] IOTA: A Framework for Analyzing System-Level Security of IoTs [J]. 7TH ACM/IEEE CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2022), 2022, : 143 - 155