共 18 条
- [1] Babenko L.K., 2018, CYBERSECURITY ISSUES, P28
- [2] Computationally Sound Verification of Source Code [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 387 - 398
- [3] Bhargavan K, 2008, ACM T PROGRAMMING LA, V31, P5
- [4] Bhargavan K., 2006, INT WORKSH WEB SERV, P88
- [5] Bhargavan K, 2008, P 2008 ACM S INF COM, P123
- [6] Bhargavan K, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P459
- [7] Towards an Empirical Analysis of .NET Framework and C# language Features' Adoption [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 865 - 866
- [8] ASPIER: An Automated Framework for Verifying Security Protocol Implementations [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 172 - 185
- [9] Cremers C. J. F, 2008, INT C COMP AID VER, P414
- [10] Goubault-Larrecq J., 2005, INT WORKSH VER MOD C, P363