共 41 条
- [1] Agrawal R, 1998, LECT NOTES COMPUT SC, V1377, P469
- [3] [Anonymous], 2016, P 5 INT WORKSHOP SOF
- [4] Babcock B., 2002, PODS, P1, DOI [DOI 10.1145/543613.543615, 10.1145/543613.543615]
- [5] Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 468 - 479
- [7] Broy M., 2006, 28th International Conference on Software Engineering Proceedings, P33, DOI 10.1145/1134285.1134292
- [10] Detecting and localizing wireless spoofing attacks [J]. 2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 193 - +