共 53 条
- [1] Abusaimeh H., 2020, International Journal of Advanced Trends in Computer Science and Engineering, V9, P4141, DOI DOI 10.30534/IJATCSE/2020/243932020
- [2] Towards a Formal Foundation of Web Security [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 290 - 304
- [3] Threat Modeling for Cloud Data Center Infrastructures [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 302 - 319
- [4] [Anonymous], National Security Branch
- [5] Benzadri Z, 2014, LECT NOTES COMPUT SC, V8377, P381, DOI 10.1007/978-3-319-06859-6_34
- [6] Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 468 - 479
- [7] A Formal Model of Client-Cloud Interaction [J]. CORRECT SOFTWARE IN WEB APPLICATIONS AND WEB SERVICES, 2015, : 83 - 144
- [8] Boubour R, 1997, IEEE DECIS CONTR P, P720, DOI 10.1109/CDC.1997.650720
- [9] A Petri Net-Based Approach to Model and Analyze the Management of Cloud Applications [J]. TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XI, 2016, 9930 : 28 - 48
- [10] Clarke E, 2001, LECT NOTES COMPUT SC, V2000, P176