共 21 条
[2]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[3]
[Anonymous], 1989, PRENTICE HALL INT SE
[4]
[Anonymous], 2014, P 21 ANN NETW DISTR
[5]
Barbuti R, 1999, SOFTWARE PRACT EXPER, V29, P1123, DOI 10.1002/(SICI)1097-024X(199910)29:12<1123::AID-SPE275>3.0.CO
[6]
2-6
[7]
Batista E, 2016, INT CONF INFORM INTE
[8]
Canfora G, 2015, P WORKSH MOB SYST TE
[9]
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking
[J].
2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING,
2015,
:26-32
[10]
Cleaveland R., 1996, Computer Aided Verification. 8th International Conference, CAV '96. Proceedings, P394