[1] |
REYNOLDS P , KILLIAN C , WIENER J L , et al. Pip:detecting the unexpected in distributed systems[C]// The 3rd Symposium on Net-worked Systems Design and Implementation. USENIX Assoc ion Berkeley,CA,USA, c2006:115-128.
|
[2] |
杨晓晖, 周学海, 田俊峰 , 等. 一个新的软件行为动态可信评测模型[J]. 小型微型计算机系统, 2010,31(11): 2113-2120. YANG X H , ZHOU X H , TIAN J F , et al. Novel dynamic trusted evaluation model of software behavior[J]. Journal of inese Computer Systems, 2010,31(11): 2113-2120.
|
[3] |
刘玉玲, 杜瑞忠, 冯建磊 , 等. 基于软件行为的检查点风险评估信任模型[J]. 西安电子科技大学学报(自然科学版), 2012,39(1): 179-184. LIU Y L , DU R Z , FENG J L , et al. Trust model of software behaviors based on check point risk assessment[J]. Journal of Xidian University, 2012,39(1): 179-184.
|
[4] |
田俊峰, 张亚姣 . 基于马尔可夫的检查点可信评估方法[J]. 通信学报, 2015,36(1): 230-236. TIAN J F , ZHANG Y J . Checkpoint trust evaluation method based on Markov[J]. Journal on Communications, 2015,36(1): 230-236.
|
[5] |
刘东红, 郭长国, 王怀民 , 等. 监控使能的分布式软件系统构造方法[J]. 软件学报, 2011,22(11): 2610-2624. LIU D H , GUO C G , WANG H M , et al. Monitoring enabled istri-buted software construction method[J]. Journal of Software, 2011,22(11): 2610-2624.
|
[6] |
文志诚, 李长云, 满君丰 . 基于贝叶斯网的分布式软件行为运行时可信性分析[J]. 小型微型计算机系统, 2012,33(3): 504-511. WEN Z C , LI C Y , MAN J F . Analyzing running-time behavioral cre-dibility for distributed software based on Bayesian network[J]. Journal of Chinese Computer Systems, 2012,33(3): 504-511.
|
[7] |
彭成, 杨路明, 满君丰 . 网络化软件交互行为动态建模[J]. 电子学报, 2013,41(2): 314-320. PENG C , YANG L M , MAN J F . Dynamic modeling of networked software interactive behavior[J]. Acta Electronica Sin, 2013,41(2): 314-320.
|
[8] |
WANG Q , LU Y , XU Z J , et al. Software reliability mode for com-ponent interaction mode[J]. Journal of Electronics(Chi 2011,28(4/5/6): 632-642.
|
[9] |
YANG N H , YU H Q , QIAN Z L , et al. Modeling and quantitatively predicting software security based on stochastic Petri nets[J]. Mathe-matical and Computer Modeling, 2012,55(1-2):102-112.
|
[10] |
TYAGI K , SHARMA A . An adaptive neuro fuzzy model for estimat-ing the reliability of component-based software systems[J]. Applied Computing and Informatics, 2014,10(s1-2):38-51.
|
[11] |
CHEN X H , LIU J , LIU Z M . Requirements monitoring for nternet-ware:an interaction based approach[J]. Science China:Information Science, 2013,56(8):1-5.
|
[12] |
GOKHALE S S . Architecture-based software reliability analysis:overview and limitations[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(1):32-40.
|
[13] |
CHEUNG R C . A user-oriented software reliability model[J]. IEEE Transactions on Software Engineering, 1980,SE-6(2):118-125.
|
[14] |
GOKHALE S S , WONG W E , HORGAN J R , et al. An analytical approach to architecture-based software performance and reliability prediction[J]. Performance Evaluation, 2004,58(4):391-412.
|
[15] |
HSU C J , HUANG C Y . An adaptive reliability analysis using path testing for complex component-based software systems[J]. IEEE Transactions on Reliability, 2011,60(1):158-170.
|
[16] |
YACOUB S , CUKIC B , AMMAR H H . A scenario-based reliability analysis approach for component-based software[J]. IEEE Transac-tions Reliability, 2004,54(4):465-480.
|
[17] |
李珍, 田俊峰, 赵鹏远 . 基于分级属性的软件监控点可信行为模型[J]. 电子与信息学报, 2012,34(6): 1445-1451. LI Z , TIAN J F , ZHAO P Y . A trustworthy behavior model for software monitoring point based on classification attributes[J]. Journal of Electronics & Information Technology, 2012,34(6): 1445-1451.
|
[18] |
李珍, 田俊峰, 杨晓晖 . 基于检查点分级属性的软件动态可信评测模型[J]. 计算机研究与发展, 2013,50(11): 2397-2405. LI Z , TIAN J F , YANG X H . Dynamic trustworthiness eval ion model of software based on checkpoint's classification attributes[J]. Journal of Computer Research and Development, 2013,50(11): 2397-2405.
|
[19] |
邵建平, 王玲 . “拉长板”木桶原理及其运用研究[J]. 科技管理研究, 2005,25(4): 159-161. SHAO J P , WANG L . Research on “stretched panels” bucket theory and its application[J]. Science and Technology Manage nt Research, 2005,25(4): 159-161.
|