共 56 条
- [11] Clarke E.M., 1987, CMUCS87145
- [12] Dam M., 2013, PROC ACM SIGSAC C CO, P223
- [13] Dark Side of the Shader: Mobile GPU-Aided Malware Delivery [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 483 - 495
- [14] de Roever Willem-Paul, 2012, Concurrency Verification: Introduction to Compositional and Non-Compositional Methods
- [15] Dittia ZD, 1997, IEEE INFOCOM SER, P823, DOI 10.1109/INFCOM.1997.644547
- [17] Dong N., 2021, FORMAL METHODS COMPU
- [18] Duan J., 2013, THESIS U UT UT
- [19] Duflot L, 2011, LECT NOTES COMPUT SC, V6961, P378, DOI 10.1007/978-3-642-23644-0_20
- [20] Enami T, 2015, IEEE TOPIC CONF WIRE, P53, DOI 10.1109/WISNET.2015.7127418