Funder
Institute for Information and Communications Technology Promotion
Publisher
Springer Science and Business Media LLC
Reference111 articles.
1. ACM (2021) https://dl.acm.org/. Accessed 1 Feb 2021
2. Anderson JP (1972) Computer security technology planning study. ANDERSON (JAMES P) AND CO FORT WASHINGTON PA FORT WASHINGTON
3. Asad M, Ahmed S (2016) Model Driven Architecture for Secure Software Development Life Cycle. Int J Comput Sci Inf Secur (IJCSIS) 14(6)
4. Avizienis A et al (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Depend Secure Comput 1(1):11–33
5. Bacic E (1990) The Canadian trusted computer product evaluation criteria (CTCPEC). In: Proceedings of the sixth annual computer security applications conference. IEEE
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献