共 87 条
[1]
Shedding Light on Distributed System Executions
[J].
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014),
2014,
:598-599
[2]
Acharya M., 2007, Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ESEC-FSE'07, P25, DOI 10.1145/1287624.1287630
[3]
Detecting Deceptive Reviews using Generative Adversarial Networks
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:89-95
[4]
Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
[5]
ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security
[J].
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2017,
:349-361
[7]
Aniello Leonardo, 2016, Computer Safety, Reliability and Security. 35th International Conference, SAFECOMP 2016. Proceedings: LNCS 9922, P172, DOI 10.1007/978-3-319-45477-1_14
[8]
[Anonymous], 2016, TEXADA USER MANUAL
[9]
[Anonymous], 2018, P JOINT EUR C MACH L
[10]
[Anonymous], 2017, DAIKON INVARIANT DET