共 50 条
- [21] Checking Network Security Policy Violations via Natural Language Questions 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
- [23] UML based Security Function Policy Verification Method for Requirements Specification 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833
- [25] Neutralization: New insights into the problem of employee information systems security policy violations MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
- [27] Models for Storage in Database Backends A Rigorous Approach for Formally-Correct Designs PROCEEDINGS OF THE ELEVENTH ACM WORKSHOP ON PRINCIPLES AND PRACTICE OF CONSISTENCY FOR DISTRIBUTED DATA, PAPOC 2024, 2024, : 58 - 66
- [28] A Metric-Based Approach for Anti-pattern Detection in UML Designs COMPUTER AND INFORMATION SCIENCE 2011, 2011, 364 : 17 - 33