共 50 条
[31]
A High-level Aspect-oriented-based Framework for Software Security Hardening
[J].
INFORMATION SECURITY JOURNAL,
2008, 17 (02)
:56-74
[33]
Nguyen Phong Hoang, 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT), P517, DOI 10.1109/ICACT.2015.7224918
[34]
Oasis eXtensible access control markup language(XACML), 30 OASIS
[35]
Oleshchuk Vladimir, 2009, Proceedings 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), P336, DOI 10.1109/WIRELESSVITAE.2009.5172470
[36]
Predicting travel mode of individuals by machine learning
[J].
18TH EURO WORKING GROUP ON TRANSPORTATION, EWGT 2015,
2015, 10
:840-849
[37]
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[38]
Rao P, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P63, DOI 10.1145/1542207.1542218
[39]
Adaptive risk-aware access control model for Internet of Things
[J].
2017 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2017),
2017,
:40-49