Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 348-352.
• Information Security • Previous Articles Next Articles
SUN Bao-hua1,3, HU Nan3, LI Dong-yang2,3
CLC Number:
[1]陈志慧.基于Event-B的软件需求形式化建模技术的研究[D].成都:电子科技大学,2013. [2]MALHOTRA R,CHUG A,HAYRAPETIAN A,et al.Analyzing and evaluating security features in software requirements[C]∥International Conference on Innovation and Challenges in Cyber Security.2016:26-30. [3]熊伟,王娟丽,蔡铭.基于QFD技术的软件可信性评估研究[J].计算机应用研究,2010,27(8):2991-2994. [4]王飞,郭渊博,李波,等.安全苛求软件需求规格中的安全特性验证方法[J].计算机应用,2013,33(7):2041-2045. [5]KNAUSS E,OTT D.(Semi-) automatic Categorization of Natural Language Requirements[C]∥International Working Conference on Requirements Engineering:Foundation for Software Quality.Springer International Publishing,2014:39-54. [6]白川,张璇,王旭,等.可信软件非功能需求可满足性经济学方法分析[J].计算机工程与应用,2017,53(22):249-257. [7]张璇,李彤,王旭,等.可信软件非功能需求形式化表示与可满足分析[J].软件学报,2015,26(10):2545-2566. [8]TAKAHASHI T,KANNISTO J,HARJU J,et al.Expressing Security Requirements:Usability of Taxonomy-Based Requirement Identification Scheme[C]∥IEEE World Congress on Services.IEEE Computer Society,2014:121-128. [9]徐戈,王厚峰.自然语言处理中主题模型的发展[J].计算机学报,2011,34(8):1423-1436. [10]RANTOS K,MARKANTONAKIS K.Analysis of Potential Vulnerabilities in Payment Terminals[M]∥Secure Smart Embedded Devices,Platforms and Applications.Springer New York,2014:311-333. [11]倪盛俭.汉语文本蕴涵识别研究[D].武汉:武汉大学,2013. [12]李睿,曾俊瑀,周四望.基于局部标签树匹配的改进网页聚类算法[J].计算机应用,2010,30(3):818-820. [13]周冬梅.基于演化算法的智能学习与优化方法的研究[D].无锡:江南大学,2015. [14]伦向敏,侯一民.运用迭代最大熵算法选取最佳图像分割阈值[J].计算机工程与设计,2015,40(5):1265-1268. [15]GOLIA S,SIMONETTO A.Treating ordinal data:a comparison between rating scale and structural equation models[J].Quality &Quantity,2015,49(3):903-915. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[4] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[5] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[6] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[7] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[8] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | LI Xiao-wei, SHU Hui, GUANG Yan, ZHAI Yi, YANG Zi-ji. Survey of the Application of Natural Language Processing for Resume Analysis [J]. Computer Science, 2022, 49(6A): 66-73. |
[11] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[12] | KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158. |
[13] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[14] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[15] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
|