共 15 条
[2]
Baldini G, 2016, 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P627, DOI 10.1109/WF-IoT.2016.7845514
[3]
Dragoni N, 2007, SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, P90
[4]
Ask the Experts: What Should Be on an IoT Privacy and Security Label?
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:447-464
[5]
Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt
[J].
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS,
2015,
:50-60
[6]
Hussain F, 2018, PROC 14 INT C NATURA, P1246, DOI [10.1109/ FSKD.2018.8687201, DOI 10.1109/FSKD.2018.8687201]
[7]
Krishnan R., 2007, ACM SIGSOFT SOFTW EN, V32, P5, DOI [10.1145/1281421.1281427, DOI 10.1145/1281421.1281427]
[8]
Implementing Usage Control in Internet of Things: A Smart Home Use Case
[J].
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS,
2017,
:1056-1063