共 50 条
- [21] A Survey of Security in Software Defined Networks [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 623 - 654
- [22] Security of Neural Networks from Hardware Perspective: A Survey and Beyond [J]. 2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 449 - 454
- [23] Security of Neural Networks from Hardware Perspective: A Survey and beyond [J]. Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC, 2021, : 449 - 454
- [24] Using Clone Detection to Identify Bugs in Concurrent Software [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2010,
- [25] Reconstruction of successful software evolution using clone detection [J]. SIXTH INTERNATIONAL WORKSHOP ON PRINCIPLES OF SOFTWARE EVOLUTION, PROCEEDINGS, 2003, : 126 - 130
- [26] ClemanX: Incremental Clone Detection Tool for Evolving Software [J]. 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 437 - 438
- [27] Semantic Clone Detection via Probabilistic Software Modeling [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2022, 2022, 13241 : 288 - 309
- [28] Hardware/software security co-verification and vulnerability detection: An information flow perspective [J]. Integration, 2024, 94
- [29] SOFTWARE PIRACY AND SOFTWARE SECURITY IN BUSINESS SCHOOLS - AN ETHICAL PERSPECTIVE [J]. DATA BASE, 1991, 22 (03): : 15 - 21