共 30 条
[1]
Ahrendt Wolfgang, 2016, Lecture notes in computer science, V10001, DOI 10.1007/978-3-319-49812-6
[2]
Almorsy M, 2013, PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), P662, DOI 10.1109/ICSE.2013.6606612
[3]
[Anonymous], 2007, Secure programming with static analysis
[4]
Armbruster M., 2022, Tech. rep., DOI [10.5445/IR/1000149186, DOI 10.5445/IR/1000149186]
[5]
Fundamental Realization Strategies for Multi-View Specification Environments
[J].
PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE,
2015,
:40-49
[8]
Precise Analysis of Java']Java Programs using JOANA
[J].
EIGHTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS,
2008,
:267-268
[9]
Enforcing Architectural Security Decisions
[J].
IEEE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2020),
2020,
:35-45
[10]
Jurjens J., 2002, "UML" 2002 - Unified Modeling Language. Model Engineering, Concepts, and Tools. 5th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2460), P412