共 14 条
[1]
Bass L., 2021, Software architecture in practice, V4th
[2]
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services
[J].
PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015),
2015,
:502-509
[3]
Cerny T., 2017, Proceedings of the 2017 Research in Adaptive and Convergent Systems, RACS 2017, V2017-Janua, P228
[4]
Human Behaviour Centered Design: Developing a Software System for Cultural Heritage
[J].
2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN SOCIETY (ICSE-SEIS 2021),
2020,
:85-94
[5]
Guowei Wang, 2011, 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC 2011), P2963, DOI 10.1109/AIMSEC.2011.6010462
[6]
Josang A., 2007, P 5 AUSTRALASIAN S A, V68, P143
[7]
Securing a Cloud-Native C2 Architecture Using SSO and JWT
[J].
2021 IEEE AEROSPACE CONFERENCE (AEROCONF 2021),
2021,
[8]
Designing Internet of Behaviors Systems
[J].
IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2022),
2022,
:124-134
[9]
Pressman Roger, 2019, ISE Software Engineering: A Practitioner's Approach, V9
[10]
Schläger C, 2007, ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, P230