共 50 条
- [21] Specification mining for asynchronous controllers 2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS, 2016, : 107 - 114
- [22] Deep Specification Mining with Attention COMPUTING AND COMBINATORICS (COCOON 2020), 2020, 12273 : 186 - 197
- [25] Security policy specification in logic IC-AI'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 1-III, 2000, : 1299 - 1304
- [27] Action systems for security specification 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 102 - 113
- [28] Security Specification at Process Level 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 165 - 172
- [29] Specification of security constraint in UML 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 163 - 171
- [30] A goal question metric approach for evaluating security in a service oriented architecture context International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 238 - 249