共 47 条
[1]
Security aspects of SCADA and DCS environments
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2012, 7130
:120-149
[2]
[Anonymous], 1996, PATTERN ORIENTED SOF
[3]
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[4]
Archer L., MISUSE PATTERN UNPUB
[5]
B Fernandez E., 2013, Wiley Series on Software Design Patterns
[7]
Eliciting security requirements through misuse activities
[J].
DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2008,
:328-+
[8]
Carlson Albert H., RAILWAY SECURITY ISS
[9]
Caselli Marco, 2014, 9 INT C CRIT INF INF
[10]
Checkoway S., COMPREHENSIVE EXPT A