共 50 条
- [1] Security consistency in UML designs 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 1, REGULAR PAPERS/PANELS, PROCEEDINGS, 2006, : 351 - +
- [7] A New approach to Detect Safety Violations in UML Statechart Models INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 167 - 174
- [8] Uncovering Information Flow Policy Violations in C Programs (Extended Abstract) COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 26 - 46
- [9] On the Content Security Policy Violations due to the Same-Origin Policy PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 877 - 886
- [10] Live Forensics Analysis: Violations of Business Security Policy 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 971 - 976