共 50 条
- [41] Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 331 - 340
- [43] Automatic Generation of Executable Code from Software Architecture Models INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 1047 - 1058
- [44] Extracting LPL privacy policy purposes from annotated web service source code Software and Systems Modeling, 2023, 22 : 331 - 349
- [45] Extracting LPL privacy policy purposes from annotated web service source code SOFTWARE AND SYSTEMS MODELING, 2023, 22 (01): : 331 - 349
- [47] The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 2104 - 2115
- [48] Extracting acyclic dependency models from quality standards for COTS software evaluation Journal of Aerospace Computing, Information and Communication, 2006, 3 (07): : 327 - 339
- [49] Extracting Software Product Line Feature Models from Natural Language Specifications SPLC'18: PROCEEDINGS OF THE 22ND INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL 1, 2018, : 43 - 53
- [50] Extracting facts from Perl code 13TH WORKING CONFERENCE ON REVERSE ENGINEERING PROCEEDINGS, 2006, : 243 - 252