共 56 条
- [1] AN OLD-FASHIONED RECIPE FOR REAL-TIME [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (05): : 1543 - 1571
- [2] Alglave J., EUR S PROGR, P512
- [3] Herding Cats: Modelling, Simulation, Testing, and Data Mining for Weak Memory [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 36 (02):
- [4] Alkassar E, 2010, LECT NOTES COMPUT SC, V6217, P40, DOI 10.1007/978-3-642-15057-9_3
- [5] Alur R., 2001, Embedded Software, V2211, P14
- [6] [Anonymous], 2014, BadUSB-On accessories that turn evil
- [7] Barthe Gilles, 2011, FM 2011: Formal Methods. Proceedings 17th International Symposium on Formal Methods, P231, DOI 10.1007/978-3-642-21437-0_19
- [8] Cache-leakage resilient OS isolation in an idealized model of virtualization [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 186 - 197
- [9] Baumann C, 2016, 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), P210, DOI 10.1109/EuCNC.2016.7561034
- [10] Baumann F, 2019, POSITIF, P23