共 50 条
[43]
Security of information flow in the electric power grid
[J].
CRITICAL INFRASTRUCTURE PROTE CTION,
2008, 253
:43-+
[44]
ENCOVER: Symbolic Exploration for Information Flow Security
[J].
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2012,
:30-44
[46]
Information flow query and verification for security policy of Security-Enhanced Linux
[J].
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS,
2006, 4266
:389-404
[47]
VERONICA: Expressive and Precise Concurrent Information Flow Security
[J].
2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020),
2020,
:79-94
[48]
Analyzing fuzziness in product quality & reliability information-flow during time-driven product-development-process
[J].
ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2002 PROCEEDINGS,
2002,
:496-502
[49]
Towards Scalable Defense of Information Flow Security for Distributed Systems
[J].
PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19),
2019,
:438-442
[50]
Colored Petri Nets Based Modeling of Information Flow Security
[J].
WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS,
2009,
:681-684