共 56 条
[11]
Ben-Yehuda M., 2007, Proc. Linux Symp, V1, P9
[12]
Clarke E.M., 1987, Technical Report CMU-CS-87-145
[13]
Dam Mads, 2013, P 2013 ACM SIGSAC C, P223
[14]
Dark Side of the Shader: Mobile GPU-Aided Malware Delivery
[J].
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013,
2014, 8565
:483-495
[15]
de Roever W.-P., 2012, Concurrency Verification: Introduction to Compositional and Non-Compositional Methods
[16]
Dittia ZD, 1997, IEEE INFOCOM SER, P823, DOI 10.1109/INFCOM.1997.644547
[18]
Dong N., 2021, Formal Methods in Computer Aided Design
[19]
Duan J., 2013, Ph.D. dissertation
[20]
Duflot L, 2011, LECT NOTES COMPUT SC, V6961, P378, DOI 10.1007/978-3-642-23644-0_20