Author:
Chen Fei Yang,Xu Wen Tao,Qian Zhen Jiang,Yang Wei Yong,Liu Wei
Reference12 articles.
1. Chen, L., Yang, C., Liu, F., Gong, D., Ding, S.: Automatic mining of security-sensitive functions from source code. Comput. Mater. Continua 56, 199–210 (2018)
2. Kou, L., Shi, Y., Zhang, L., Liu, D., Yang, Q.: A lightweight three-factor user authentication protocol for the information perception of IoT. Comput. Mater. Continua 58, 545–565 (2019)
3. Zhang, Y., Huang, M., Wang, H., Feng, W., Cheng, J., Zhou, H.: A co-verification interface design for high-assurance CPS. Comput. Mater. Continua 58, 287–306 (2019)
4. Saydjari, O.S., Beckman, J.M., Leaman, J.R.: LOCK trek: navigating uncharted space. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy (1989)
5. Hohmuth, M., Tews, H., Stephens, S.G.: Applying source-code verification to a microkernel: the VFiasco project. In: Proceedings of the 10th ACM SIGOPS European Workshop, pp. 165–169. ACM, New York, USA (2002)