共 47 条
- [1] Alcaraz Cristina, 2012, Critical Infrastructure Protection. Information Infrastructure Models, Analysis, and Defense: LNCS 7130, P120, DOI 10.1007/978-3-642-28920-0_7
- [2] [Anonymous], 1996, PATTERN ORIENTED SOF
- [3] [Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
- [4] Archer L., MISUSE PATTERN UNPUB
- [5] B Fernandez E., 2013, Wiley Series on Software Design Patterns
- [7] Eliciting security requirements through misuse activities [J]. DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
- [8] Carlson Albert H., RAILWAY SECURITY ISS
- [9] Caselli Marco, 2014, 9 INT C CRIT INF INF
- [10] Checkoway S., COMPREHENSIVE EXPT A