Author:
Fiaschetti Andrea,Lavorato Francesco,Suraci Vincenzo,Palo Andi,Taglialatela Andrea,Morgagni Andrea,Baldelli Renato,Flammini Francesco
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Common Criteria for Information Technology Security Evaluation, v3.1 (July 2009)
2. Ding, L., Kolari, P., Ding, Z., Avancha, S.: Using Ontologies in the Semantic Web: A Survey. Ontologies 14, 79–113 (2007)
3. Mascardi, V., Locoro, A., Rosso, P.: Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation. IEEE Transactions on Knowledge and Data Engineering 22(5), 609–623 (2010)
4. Henkel, J., Narayanan, V., Parameswaran, S., Ragel, R.: Security and Dependability of Embedded Systems: A Computer Architects’ Perspective”. In: 22nd International Conference on VLSI Design 2009, pp. 30–33 (2009), doi:10.1109/VLSI.Design.2009.114
5. pSHIELD Technical Annex (June 2010)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献