共 14 条
[1]
Using SysML for model-based vulnerability assessment
[J].
2015 CONFERENCE ON SYSTEMS ENGINEERING RESEARCH,
2015, 44
:413-422
[2]
Different Obfuscation Techniques for Code Protection
[J].
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS,
2015, 70
:757-763
[3]
Biahmou A., 2015, CONCURRENT ENG 21 CE, P221, DOI [10.1007/978-3-319-13776-6_9, DOI 10.1007/978-3-319-13776-6_9]
[4]
Blochwitz T., 2012, P 9 INT MODELICA C S
[5]
Eckl C., 2016, P TMCE 2016
[6]
Kuebler C., 2017, PRODUCT DATA J
[7]
Kuhn O, 2011, IFIP ADV INF COMM TE, V355, P178
[8]
Liese H., 2010, 2010 IEEE INT TECHN
[9]
Maurer M., 2013, Automotive Systems Engineering
[10]
prostep ivip, 2018, 11 PSI