共 50 条
- [31] A flexible method for information system security policy specification COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 67 - 84
- [32] Specification and verification of applications based on function blocks COMPONENT-BASED SOFTWARE DEVELOPMENT FOR EMBEDDED SYSTEMS: AN OVERVIEW OF CURRENT RESEARCH TRENDS, 2005, 3778 : 8 - 34
- [35] An Approach for Interoperability Requirements Specification and Verification ENTERPRISE INTEROPERABILITY, 2011, 76 : 89 - 102
- [36] Specification of function block applications with UML 2005 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), VOLS 1-4, 2005, : 4002 - 4007
- [37] UML Activity Diagrams in Requirements Specification of Logic Controllers INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2015 (ICCMSE 2015), 2015, 1702
- [39] Specification, verification, and quantification of security in model-based systems Computing, 2015, 97 : 691 - 711
- [40] Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, 14182 : 15 - 25