共 19 条
- [1] Reynolds P., Killian C., Wiener J.L., Et al., Pip: detecting the unexpected in distributed systems, The 3rd Symposium on Networked Systems Design and Implementation, pp. 115-128, (2006)
- [2] Yang X.H., Zhou X.H., Tian J.F., Et al., Novel dynamic trusted evaluation model of software behavior, Journal of Chinese Computer Systems, 31, 11, pp. 2113-2120, (2010)
- [3] Liu Y.L., Du R.Z., Feng J.L., Et al., Trust model of software behaviors based on check point risk assessment, Journal of Xidian University, 39, 1, pp. 179-184, (2012)
- [4] Tian J.F., Zhang Y.J., Checkpoint trust evaluation method based on Markov, Journal on Communications, 36, 1, pp. 230-236, (2015)
- [5] Liu D.H., Guo C.G., Wang H.M., Et al., Monitoring enabled distributed software construction method, Journal of Software, 22, 11, pp. 2610-2624, (2011)
- [6] Wen Z.C., Li C.Y., Man J.F., Analyzing running-time behavioral credibility for distributed software based on Bayesian network, Journal of Chinese Computer Systems, 33, 3, pp. 504-511, (2012)
- [7] Peng C., Yang L.M., Man J.F., Dynamic modeling of networked software interactive behavior, Acta Electronica Sinica, 41, 2, pp. 314-320, (2013)
- [8] Wang Q., Lu Y., Xu Z.J., Et al., Software reliability model for component interaction mode, Journal of Electronics (China), 28, 4-6, pp. 632-642, (2011)
- [9] Yang N.H., Yu H.Q., Qian Z.L., Et al., Modeling and quantitatively predicting software security based on stochastic Petri nets, Mathematical and Computer Modeling, 55, 1-2, pp. 102-112, (2012)
- [10] Tyagi K., Sharma A., An adaptive neuro fuzzy model for estimating the reliability of component-based software systems, Applied Computing and Informatics, 10, s1, pp. 38-51, (2014)