共 56 条
[1]
Abdelrazek M., 2016, ADAPTABLE SOFTWARE A, P99
[2]
Al-Sayid NA, 2013, INT CONF COMP SCI, P60, DOI 10.1109/CSIT.2013.6588759
[3]
[Anonymous], 2013, 215 ISOTC, V2014, P38
[4]
[Anonymous], 2009, DATABASE SECURITY GU, P1
[5]
[Anonymous], 2015, Handbook on Business Process Management 1: Introduction, Methods, and Information Systems, DOI [DOI 10.1007/978-3-642-45100-3_10, 10.1007/978-3-642-45100-3, DOI 10.1007/978-3-642-45100-3, 10.1007/978-3-642-45100-310, DOI 10.1007/978-3-642-45100-310]
[8]
When Program Analysis Meets Mobile Security: An Industrial Study of Misusing Android Internet Sockets
[J].
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2017,
:842-847
[9]
Cherdantseva Y., 2014, THESIS
[10]
Cherdantseva Y, 2012, LECT NOTES BUS INF P, V125, P107