共 29 条
[3]
[Anonymous], 2003, TECHNOMETRICS
[4]
[Anonymous], 2017, Introduction to Graph Theory. MathClassics
[5]
Enhancing Misuse Cases With Risk Assessment for Safety Requirements
[J].
IEEE ACCESS,
2020, 8
:12001-12014
[7]
Behrmann G., 2006, TECH REP, P2
[8]
Goal-based configuration analysis for networks of collaborative cyber-physical systems
[J].
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20),
2020,
:1387-1396
[9]
Towards a Framework for Safe and Secure Adaptive Collaborative Systems
[J].
2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2,
2019,
:165-170
[10]
Automatic Identifying Interaction Components in Collaborative Cyber-Physical Systems
[J].
2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC),
2019,
:197-203