共 109 条
[1]
Agrawal A., 2019, J KING SAUD U COMPUT, DOI DOI 10.1016/J.JKSUCI.2019.04.007
[3]
Al-Hamdani W.A., 2009, InfoSecCD '09, P84
[4]
[Anonymous], 2011, 2011 6 INT C RISKS S
[5]
Ardagna Claudio A, 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, P175
[7]
The Dempster-Shafer theory of evidence: an alternative approach to multicriteria decision modelling
[J].
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE,
2000, 28 (01)
:37-50
[8]
Bialas Andrzej, 2020, Engineering in Dependability of Computer Systems and Networks. Proceedings of the Fourteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. Advances in Intelligent Systems and Computing (AISC 987), P46, DOI 10.1007/978-3-030-19501-4_5
[10]
Vulnerability Prediction From Source Code Using Machine Learning
[J].
IEEE ACCESS,
2020, 8
:150672-150684