共 50 条
- [42] A Survey of Software Clone Detection From Security Perspective [J]. IEEE ACCESS, 2021, 9 : 48157 - 48173
- [43] METHOD FOR CRITICAL CURRENT TESTING - SOFTWARE CORRECTIONS [J]. IEEE TRANSACTIONS ON MAGNETICS, 1989, 25 (02) : 1823 - 1826
- [45] Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 185 - 194
- [46] Software Security Testing via Misuse Case Modeling [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 534 - 541
- [47] Security Testing for Naval Ship Combat System Software [J]. IEEE ACCESS, 2021, 9 : 66839 - 66851
- [48] Non-Operational Testing of Software for Security Issues [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2013, : 21 - 22
- [49] Software Security Testing of Web Applications Based on SSD [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 93 : 527 - 534
- [50] A Framework for Testing Hardware-Software Security Architectures [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 387 - 397