共 50 条
[22]
Vulnerabilities and Threats in Cloud Software Engineering Security
[J].
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014),
2015, 274
:1822-1831
[23]
Organizing the monitoring of vulnerabilities in the CPCS software and hardware
[J].
NAUKA I TEHNOLOGII TRUBOPROVODNOGO TRANSPORTA NEFTI I NEFTEPRODUKTOV-SCIENCE & TECHNOLOGIES-OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION,
2019, 9 (04)
:458-466
[24]
Understanding the Enablers of Blockchain Technology Adoption in Sustainable Supply Chains: A DEMATEL-Based Analysis
[J].
IFAC PAPERSONLINE,
2022, 55 (10)
:1962-1967
[25]
Understanding the Challenges in Detecting Vulnerabilities of Rust Applications
[J].
2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024,
2024,
:54-63
[28]
Model-Based Evaluation of Vulnerabilities in Software Systems
[J].
24TH ACM SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2020, VOL B,
2020,
:112-119
[29]
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
[J].
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018),
2019,