[1] |
尚珊珊, 赵轶群 . 软件可靠性综述[J]. 软件导刊, 2006,5(15):3-5. SHANG S S , ZHAO Y Q . Overview of software reliability[J]. Software Guide, 2006,5(15):3-5.
|
[2] |
ZHANG H G , LUO J , JIN G , et al. Development of trusted computing research[J]. Journal of Wuhan University(Natural Science Edition), 2006,52(5): 513-518.
|
[3] |
Trusted Computing Group. TCG specification architecture overview[EB/OL]. . 2013.
|
[4] |
WANG H M , TANG Y B , YIN G , et al. Trustworthiness of Internet-based software[J]. Science in China:Series F Information Sciences, 2006,49(6): 759-773.
|
[5] |
杨善林, 丁帅, 褚伟 . 一种基于效用和证据理论的可信软件评估方法[J]. 计算机研究与发展, 2009,46(7):1152-1159. YANG S L , DING S , CHU W . Trustworthy software evaluation using utility based evidence theory[J]. Journal of Computer Research and Development, 2009,46(7):1152-1159.
|
[6] |
蔡斯博, 邹艳珍, 邵凌霜 等. 一种支持软件资源可信评估的框架[J]. 软件学报, 2010,21(2):359-372. CAI S B , ZOU Y Z , SHAO L S , et al. Framework supporting software assets evaluation on trustworthiness[J]. Journal of Software, 2010,21(2):359-372.
|
[7] |
沈国华, 黄志球, 钱巨 等. 软件可信评估模型及其工具实现[J]. 计算机科学与探索, 2011,5(6):553-561. SHEN G H , HUANG Z Q , QIAN J , et al. Research on software trustworthiness evaluation model and its implementation[J]. Journal of Frontiers of Computer Science an Technology, 2011,5(6):553-561.
|
[8] |
丁帅, 鲁忖俊, 杨善林 等. 一种需求驱动的软件可信性评估及演化模型[J]. 计算机研究与发展, 2011,48(4):647-655. DING S , LU F J , YANG S L , et al. A requirement-driven software trustworthiness evaluation and evolution model[J]. Journal of Computer Research and Development, 2011,48(4):647-655.
|
[9] |
DIAKOV K , BATTERAMA J , ZANDBELT H . Monitoring of distributed component interactions[A]. Proceeding of IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing[C]. New York,USA, 2000. 229-243.
|
[10] |
LI J . Monitoring and characterization of component-based systems with global causality capture[A]. Proceeding of the 23rd International Conference on Distributed Computing Systems[C]. Rhode Island,USA, 2003. 422-433.
|
[11] |
MARIANI L , PEZZE M . A technique for verifying component-based software[J]. Electronic Notes in Theoretical Computer Science, 2005,116(1): 17-30.
|
[12] |
CHEN F , GRIGORE R . Mop:an efficient and generic runtime verification framework[A]. Proceeding of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications[C]. Montreal,Canada, 2007. 569-588.
|
[13] |
古亮, 郭耀, 王华 等. 基于 TPM 的运行时软件可信证据收集机制[J]. 软件学报, 2010,21(2):373-388. GU L , GUO Y , WANG H , et al. Runtime software trustworthiness evidence collection mechanism based on TPM[J]. Journal of Software, 2010,21(2):373-388.
|
[14] |
刘玉玲, 杜瑞忠, 冯建磊 等. 基于软件行为的检查点风险评估信任模型[J]. 西安电子科技大学学报, 2012,39(1):179-184. LIU Y L , DU R Z , FENG J L , et al. Trust model of software behaviors based on check point risk assessment[J]. Journal of Xidian University, 2012,39(1):179-184.
|
[15] |
刘辉, 白峰杉 . 基于混合高斯过程模型的高光谱图像分类算法[J]. 高校应用数学学报, 2010,25(4):379-385. LIU H , BAI F S . Hyperspectral image classification based on mixed Gaussian process model[J]. Applied Mathematics A Journal of Chinese Universities, 2010,25(4):379-385.
|
[16] |
王爱萍, 张功营, 刘方 . EM算法研究与应用[J]. 计算机技术与发展, 2009,19(9):108-110. WANG A P , ZHANG G Y , LIU F . Research and application of EM algorithm[J]. Computer Technology and Development, 2009,19(9):108-110.
|
[17] |
胡宇驰 . 应用马尔科夫状态图法进行可靠性评估[J]. 电子科技大学学报, 2001,30(2):175-180. HU Y C . Evaluation of reliability of a fault-tolerance computer system by Markov status graph[J]. Journal of UEST of China, 2001,30(2):175-180.
|
[18] |
J?SANG A . A logic for uncertain probabilities[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2001,9(3): 279-311.
|
[19] |
张吉军 . 模糊层次分析法(FAHP)[J]. 模糊系统与数学, 2000,12(2):80-88. ZHANG J J . Fuzzy analytical hierarchy process[J]. Fuzzy Systems and Mathematics, 2000,12(2):80-88.
|
[20] |
邵建平, 王玲 . “拉长板”木桶原理及其运用研究[J]. 科技管理研究, 2005,(4):159-161. SHAO J P , WANG L . Study on “stretched panels” bucket theory and its applicaion[J]. Science and Technology Management Research, 2005,4:159-161.
|
[21] |
国家信息安全漏洞平台. GNU GZip 文档处理多个安全漏洞[EB/OL]. , 2013.China National Vulnerability Database. GNU Gzip Deals with many security vulnerabilities[EB/OL]. , 2013.
|