共 7 条
[1]
ARINC, 2005, 811 ARINC
[3]
Duflot L, 2009, LECT NOTES COMPUT SC, V5471, P14, DOI 10.1007/978-3-642-00587-9_2
[4]
A Few Remarks About Formal Development of Secure Systems
[J].
11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS,
2008,
:165-+
[5]
RTCA/EUROCAE, 2011, DO178C RTCAEUROCAE
[6]
Sang F. L., 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P7, DOI 10.1109/MALWARE.2010.5665798
[7]
SIBERT O, 1995, P IEEE S SECUR PRIV, P211, DOI 10.1109/SECPRI.1995.398934