共 50 条
- [41] The security requirements behavior model for trustworthy software 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
- [42] Research of Remote Backup Protection Functioning at the Software and Hardware Complex RTDS 2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
- [43] Security Assurance Model of Software Development for Global Software Development Vendors IEEE ACCESS, 2022, 10 : 58458 - 58487
- [44] A security protection mechanism on program runtime based on software and hardware cooperation Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 180 - 201
- [45] Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 122 - 134
- [46] Cloud Licensing Model for .NET Software Protection PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1069 - 1074
- [47] A Stochastic Game Model with Imperfect Information in Cyber Security PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 308 - 318
- [48] Reflexive Game Model for Control the Teams of Software Developers 2015 XVIII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2015, : 66 - 69
- [50] The Building of a Security Strategy Based on the Model of Game Management 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 57 - 60