共 48 条
- [21] The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 496 - 496
- [22] Group Support Systems Research in the Field of Business Information Security; a Practitioners View [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 589 - 598
- [23] A Search-Based Approach to Multi-view Clustering of Software Systems [J]. 2015 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2015, : 429 - 438
- [24] Help, My Signal has Bad Device! Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021, 2021, 12756 : 88 - 105
- [25] A Security Architecture for Pay-Per-View Business Models in Conditional Access Systems [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 1 - 9
- [26] Security Systems with Biometry based on Partial View Facial Images Using Geometrical Features [J]. PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 204 - 209
- [27] INFLUENCE OF THE SIZE OF THE INSTANTANEOUS FIELD OF VIEW ON THE EFFICIENCY OF A SEARCH FOR A POINT OBJECT IN DISSECTOR SYSTEMS [J]. SOVIET JOURNAL OF OPTICAL TECHNOLOGY, 1981, 48 (09): : 509 - 510
- [29] A Review on Search-Based Tools and Techniques to Identify Bad Code Smells in Object-Oriented Systems [J]. HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 909 - 921