共 36 条
- [1] You Get Where You're Looking For The Impact of Information Sources on Code Security [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 289 - 305
- [2] Andalibi Vafa, 2021, 5 EAI INT C SAF SEC
- [3] Anwar Mohd., 2012, 27th Annual ACM Symposium on Applied Computing, P1443
- [5] Bauer L, 2009, CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P899
- [6] BrianWeis, 2018, MUD-Manager Version 3.0
- [7] Brooke J., 1996, Usability Evaluation in Industry, V189, P4, DOI [DOI 10.1201/9781498710411-35, 10.1201/9781498710411-35]
- [8] Camp L.J., 2019, P 52 HAW INT C SYST
- [9] Cappos Justin., 2014, Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014, P53, DOI DOI 10.1145/2683467.2683472
- [10] Chinn S, 2000, STAT MED, V19, P3127, DOI 10.1002/1097-0258(20001130)19:22<3127::AID-SIM784>3.3.CO