共 50 条
- [41] Robust estimations of the Region of Attraction using invariant sets JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2019, 356 (08): : 4622 - 4647
- [42] Fingerprint matching using multiple sets of invariant moments ICIC Express Letters, 2011, 5 (01): : 243 - 248
- [43] Modeling Software Rejuvenation on a Redundant System Using Monte Carlo Simulation 23RD IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSRE 2012), 2012, : 277 - 282
- [44] Checking Software Security Using EFSMs 2017 18TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2017, : 87 - 90
- [45] Security software using neural networks IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 1998, : 72 - 74
- [46] Architecture design of virtual-optics data security using parallel hardware and software OPTIK, 2004, 115 (01): : 15 - 22
- [47] Deals with Integrating of security specifications during software design phase using MDA approach PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
- [48] Software safety analysis using rough sets PROCEEDINGS IEEE SOUTHEASTCON '98: ENGINEERING FOR A NEW ERA, 1998, : 15 - 19
- [49] Software Component Retrieval Using Rough Sets SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 365 - 374
- [50] Set-membership observer design based on ellipsoidal invariant sets IFAC PAPERSONLINE, 2017, 50 (01): : 6471 - 6476