暂无分享,去创建一个
[1] Gary McGraw,et al. Software Penetration Testing , 2005, IEEE Secur. Priv..
[2] Helayne T. Ray,et al. Toward an automated attack model for red teams , 2005, IEEE Security & Privacy Magazine.
[3] David Pichardie,et al. Proof-carrying code from certified abstract interpretation and fixpoint compression , 2006, Theor. Comput. Sci..
[4] Tejeddine Mouelhi,et al. Testing and Modeling Security Mechanisms in Web Applications , 2010 .
[5] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[6] Lori L. Pollock,et al. An Attack Simulator for Systematically Testing Program-based Security Mechanisms , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[7] Anas Abou El Kalam,et al. Modèles et politiques de securite pour les domaines de la SANTE et des Affaires sociales. (Security policies and models for Health Care Computing and Communication Systems) , 2003 .
[8] Annie I. Antón,et al. Misuse and Abuse Cases : Getting Past the Positive , 2022 .
[9] Frédéric Cuppens,et al. Modelling contexts in the Or-BAC model , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[10] Hélène Waeselynck,et al. Validation du test du logiciel par injection de fautes : L'outil SESAME , 1998 .