共 77 条
- [1] Preventing unauthorized access in information centric networking [J]. SECURITY AND PRIVACY, 2018, 1 (04):
- [2] Adams C., 2020, SECUR PRIVACY, V3
- [3] Aftab MU, 2015, 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P83, DOI 10.1109/CIACS.2015.7395571
- [4] Ahn GJ, 2009, IEEE ICC, P998
- [5] Alshammari B.M., 2017, Journal of Computer Sciences Original, V13, P558
- [6] Alzoubi Yehia Ibrahim, 2015, Journal of Software, V10, P681, DOI 10.17706/jsw.10.6.681-694
- [7] Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 351 - 358
- [8] Angles R., 2018, CEUR WORKSHOP PROC, V2100
- [10] [Anonymous], 2014, Model Driven Architecture (MDA) Guide 2.0