Computer Science ›› 2013, Vol. 40 ›› Issue (8): 119-123.
Previous Articles Next Articles
CHEN Yong-yan,SHU Hong-chun and DAI Wei
[1] Coverity[CP/OL].http://www.coverity.com,2012 [2] CodeCheck[CP/OL].http://www.abraxas-software.com/,2012 [3] FlawFinder Home Page.http://www.dwheeler.comlflawf-inder/ [4] Bloch V J,Kohno J T T,McGraw G.ITS4:A Static Vulnerabili-ty Scanner for C and C++ Code[C]∥Proc.16th Computer Security Applications Conferences.New Orleans,LA,2000:257-266 [5] Bauer T,Lips H P,Thiele G,et al.Operational tests on HVDC thyristor modules in a synthetic test circuit for the sylmar east restoration project[J].IEEE Transactions on Power Delivery,1997 [6] 张晓琳,王国仁.用继承扩展XML-RL[J].小型微型计算机系统,2005,6(2):243-247 [7] 阳小奇,刘坚.一种基于契约的跨过程安全分析方法[J].西安电子科技大学学报:自然科学版,2006,3(3):390-394 [8] 陈海明,董韫美.上下文无关语言分析树的一种表示形式[J].计算机研究与发展,2000,7(10):1181-1184 [9] 陈再良,徐德智,陈学工,等.基于链式结构XML文档的生成方法[J].计算机工程,2006,2(10):59-61 [10] 肖袁.一种高效的XML多分支路径查询算法[J].计算机应用与软件,2010,27(7):153-155 [11] Swiler L P,Phillips C,Ellis D.Computer-attack Graph Generation Tool[C]∥Proceedings of the 2nd DARPA Information Survivability Conference & Exposition.Los Alamitos,California,USA:IEEE Computer Society,2001:307-321 [12] ISC.Internet Domain Survey.http://www.isc.org/ds/ [13] SCAP.Security Content Automation Protocol.http://scap.nist.gov/ [14] CVE.Common Vulnerabilities and Exposures.http://cve.mi-tre.org/ [15] CERT/CC.CERT/CC Statistics.http://www.cert.org/stats/ [16] 雷富兴,张来顺.基于Hoare逻辑的过程调用的形式化方法[J].计算机工程与设计,2011,2(1):197-201 |
No related articles found! |
|