共 32 条
- [1] Agerfalk P. J., 2015, Software sourcing in the age of open: leveraging the unknown workforce, P1
- [2] Alotaibi Y, 2020, Journal of Information Security and Cybercrimes Research, V3, P75
- [3] A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (02): : 1879 - 1895
- [4] Alotaibi Y, 2020, 2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020), P157, DOI [10.1109/icim49319.2020.244690, 10.1109/ICIM49319.2020.244690]
- [5] Crowdsourcing in Software Development: Empirical Support for Configuring Contests [J]. IEEE ACCESS, 2020, 8 (08): : 58094 - 58117
- [8] Corbin J., 2008, Techniques and Procedures for Developing Grounded Theory, V3rd edition, DOI [DOI 10.4135/9781452230153, 10.4135/9781452230153.n4]
- [10] Ebad SA, 2019, COMPUT SYST SCI ENG, V34, P283