共 146 条
[32]
Compastie Maxime, 2017, Security of Networks and Services in an All-Connected World. 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security, AIMS 2017. Proceedings: LNCS 10356, P47, DOI 10.1007/978-3-319-60774-0_4
[33]
Crane S, 2011, LECT NOTES COMPUT SC, V6545, P457, DOI 10.1007/978-3-642-19050-6_17
[35]
Cvitic I., 2015, Annals of DAAAM Proceedings, V26
[36]
Davies J, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P1149, DOI 10.1145/1985793.1986025
[37]
Desnitsky V, 2014, LECT NOTES COMPUT SC, V8708, P194, DOI 10.1007/978-3-319-10975-6_15
[38]
Detken KO, 2017, PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, P367, DOI 10.1109/IDAACS.2017.8095106
[40]
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634