共 50 条
- [41] Systematic security analysis for service-oriented software architectures [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 612 - 621
- [43] A Systematic Mapping on Security Threats in Mobile Devices [J]. 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 286 - 291
- [45] Security and Privacy for Blockchain: A Systematic Mapping Study [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 446 - 453
- [46] Security In The Internet Of Things - A Systematic Mapping Study [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 3750 - 3759
- [47] A systematic mapping study of usability vs security [J]. 2018 6TH INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING & INFORMATION TECHNOLOGY (CEIT), 2018,
- [48] A systematic mapping study on security for systems of systems [J]. International Journal of Information Security, 2024, 23 : 787 - 817
- [49] Mapping of natural patterns by liquid architectures implementing neural cliques [J]. APPLICATIONS OF SOFT COMPUTING: RECENT TRENDS, 2006, : 123 - +
- [50] Applying Security Patterns for authorization of users in IoT Based Applications [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING & EMERGING TECHNOLOGIES (ICEET), 2018, : 77 - 81