共 20 条
[4]
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[7]
Kafai Y. B., 2009, J SCI EDUC TECHNOL, V6, P523
[8]
KEPHART JO, 1993, 1993 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P2
[9]
KEPHART JO, 1991, 1991 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, P343
[10]
Kuang Y., 1993, MATH SCI ENG, V191