共 22 条
[11]
[Anonymous], ACM J EMERG TECHNOL
[12]
Barbareschi M, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P394, DOI 10.1109/IRI.2014.7051916
[13]
Battista Ermanno, 2013, International Journal of Critical Computer-Based Systems, V4, P374, DOI 10.1504/IJCCBS.2013.059053
[14]
Bohm C., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P269, DOI 10.1109/ICNSS.2011.6060013
[16]
Claes M, 2012, LECT NOTES COMPUT SC, V7161, P47, DOI 10.1007/978-3-642-29615-4_5
[18]
Lee YS, 2013, INT WIREL COMMUN, P1314, DOI 10.1109/IWCMC.2013.6583746
[20]
Rampon Jerome, 2015, 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), P200, DOI 10.1109/ISVLSI.2015.127