共 49 条
- [3] Al-Yaseen D.A., 2012, THESIS QUEENS U KING
- [4] Ali N., 2017, P S APPL COMP MARR M
- [5] Provenance for Collaboration: Detecting Suspicious Behaviors and Assessing Trust in Information [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 342 - 351
- [6] Ontology-Based Modeling and Analysis of Trustworthiness Requirements: Preliminary Results [J]. CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 342 - 352
- [7] Resilient and dependability management in distributed environments: a systematic and comprehensive literature review [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 1565 - 1600