共 29 条
[1]
Amoroso E., Intrusion Detection: Intrusion, (1999)
[2]
Helmer G., Wong J.S.K., Honavar V., Miller L., Intelligent agents for intrusion detection, Proceedings, IEEE Information Technology Conference, pp. 121-124, (1998)
[3]
An Introduction to Software Agents, (1997)
[4]
Leveson N.G., Safeware: System Safety and Computers, (1995)
[5]
De Lemos R., Saeed A., Anderson T., Analyzing safety requirements for process-control systems, IEEE Software, 12, 3, pp. 42-53, (1995)
[6]
Lutz R., Woodhouse R.M., Requirements analysis using forward and backward search, Ann Software Eng, 3, pp. 459-475, (1997)
[7]
Hansen K.M., Ravn A.P., Stavridou V., From safety analysis to software requirements, IEEE Trans Software Eng, 24, 7, pp. 573-584, (1998)
[8]
Amoroso E., Fundamentals of Computer Security Technology, (1994)
[9]
Leveson N.G., Cha S.S., Shimeall T.J., Safety verification of Ada programs using software fault trees, IEEE Software, 8, 4, pp. 48-59, (1991)
[10]
Lutz R.R., Targeting safety-related errors during software requirements analysis, J Syst Software, 34, pp. 223-230, (1996)