共 45 条
- [21] Towards a Call Behavior-Based Compositional Verification Framework for SysML Activity Diagrams THEORETICAL ASPECTS OF COMPUTING - ICTAC 2019, 2019, 11884 : 216 - 234
- [23] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks Evolving Systems, 2020, 11 : 479 - 490
- [24] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
- [25] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
- [26] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals EURASIP Journal on Advances in Signal Processing, 2009
- [27] Towards code generation for ARM Cortex-M MCUs from SysML activity diagrams 2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 970 - 973
- [28] Mal-activity diagrams for capturing attacks on business processes REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, 2007, 4542 : 355 - 366