共 12 条
- [1] Al Haider N., 2012, P RUNTIME VERIFICATI, V7186, P412
- [2] Belmonte J., 2010, P ONT DRIV SOFTW ENG, P1
- [3] Burke P., 2012, TECHNICAL REPORT
- [4] Hall R. T., 2013, P SOC PHOTO-OPT INS, P8757
- [6] Lakhotia A., 2013, PPREW 13
- [7] Computational Asset Description for Cyber Experiment Support using OWL [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 110 - 117
- [8] Pfeffer A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P39, DOI 10.1109/MALWARE.2012.6461006
- [9] Semantic web enabled software analysis [J]. JOURNAL OF WEB SEMANTICS, 2010, 8 (2-3): : 225 - 240
- [10] Walenstein A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P17, DOI 10.1109/MALWARE.2012.6461003