共 50 条
- [41] Security on software life cycle using intrusion detection system APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 360 - 363
- [43] Sarch-Knows: A Knowledge Graph for Modeling Security Scenarios at the Software Architecture Level SOFTWARE ARCHITECTURE: ECSA 2023 TRACKS, WORKSHOPS, AND DOCTORAL SYMPOSIUM, ECSA 2023, CASA 2023, AMP 2023, FAACS 2023, DEMESSA 2023, QUALIFIER 2023, TWINARCH 2023, 2024, 14590 : 107 - 119
- [44] The development of security system and visual service support software for on-line diagnostics 2001 IEEE INTERNATIONAL SYMPOSIUM ON SEMICONDUCTOR MANUFACTURING, CONFERENCE PROCEEDINGS, 2001, : 45 - 48
- [45] The Flask security architecture: System support for diverse security policies USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 123 - 139
- [46] Modeling of RF Security System Using Smart Antennas 2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 118 - 122
- [47] System level Security modeling using Attack trees 2009 2ND INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND COMMUNICATION, 2009, : 115 - 120
- [48] Software Security Modeling Based On Petri Nets JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 15 (01): : 70 - 77
- [50] Modeling and quantification of security attributes of software systems INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 505 - 514