共 50 条
- [21] A software architectural approach to security by design 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 83 - +
- [22] Hardware and Software Design for Automotive Security INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (09): : 74 - 79
- [23] DESIGN FOR SECURITY FUNCTIONS OF CHIPCARD SOFTWARE SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 129 - 144
- [24] CPS Security Testbed Development Using Controller-in-the-Middle PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 829 - 831
- [25] Path Planning using Positive Invariant Sets 2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 5986 - 5991
- [26] Industrial Software Rejuvenation Using Open-Source Parsers THEORY AND PRACTICE OF MODEL TRANSFORMATIONS, ICMT 2016, 2016, 9765 : 157 - 172
- [27] Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization Journal of Computer Science and Technology, 2009, 24 : 339 - 346
- [28] What are Security Patterns? A Formal Model for Security and Design of Software 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,