共 64 条
[1]
Model-Based Privacy and Security Analysis with CARiSMA
[J].
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2017,
:989-993
[3]
[Anonymous], COMM WEAKN EN
[4]
[Anonymous], 2004, Threat modeling
[5]
Arendt T, 2010, LECT NOTES COMPUT SC, V6394, P121
[6]
Baras DSA, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P310, DOI 10.1109/ISBAST.2014.7013140
[7]
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach
[J].
ENTERPRISE INFORMATION SYSTEMS, ICEIS 2013,
2014, 190
:280-295
[8]
Bowman S., 2013, PERSPECT HLTH INF MA, V10
[9]
Eliciting security requirements through misuse activities
[J].
DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2008,
:328-+