共 50 条
- [42] Third-party punishers are rewarded, but third-party helpers even more so [J]. EVOLUTION, 2015, 69 (04) : 993 - 1003
- [43] Software Ingredients: Detection of Third-party Component Reuse in Java']Java Software Release [J]. 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), 2016, : 339 - 350
- [44] THE THIRD-PARTY DOCTRINE AND THE THIRD PERSON [J]. NEW CRIMINAL LAW REVIEW, 2013, 16 (03): : 364 - 412
- [45] WADE: Simplified GUI Add-on Development for Third-party Software [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2221 - 2230
- [46] GSM phone with third-party hardware and software gets type approval [J]. EDN, 1996, 41 (16) : 26 - 26
- [47] Are Third-Party Libraries Secure? A Software Library Checker for Java']Java [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, 2019, 11391 : 18 - 34
- [48] Monitoring the Execution of Third-Party Software on Mobile Devices (Extended Abstract) [J]. RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008, 2008, 5230 : 410 - 411
- [49] Opportunities and Challenges of Third-Party Sustainment of Critical Software in Dependable Systems [J]. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2017), 2017, : 115 - 116
- [50] LibViews - An Information Visualization Application for Third-Party Libraries on Software Projects [J]. Proceedings 2016 20th International Conference Information Visualisation IV 2016, 2016, : 136 - 140