共 9 条
[2]
Cristina Abad, 2006, P 14 INT C TEL SYST, P316
[3]
Kavousi F, 2012, 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P999, DOI 10.1109/ISTEL.2012.6483132
[4]
Schiffman M, 2011, COMMON VULNERABILITY
[5]
[韦勇 WEI Yong], 2009, [计算机学报, Chinese Journal of Computers], V32, P763
[6]
Wei Yong, 2009, J COMPUTER RES DEV, V46, P353
[7]
Xi Rong-Rong, 2015, Journal of Software, V26, P1638, DOI 10.13328/j.cnki.jos.004624
[8]
[席荣荣 Xi Rongrong], 2015, [计算机学报, Chinese Journal of Computers], V38, P749
[9]
Zhang Yong, 2011, Journal of Software, V22, P495, DOI 10.3724/SP.J.1001.2011.03751