A Method of UML Sequence Diagram Verification Based on a Graph Grammar

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICBDS (1. : 2019 : Nanjing) Big data and security
1. Verfasser: Shi, Zhan (VerfasserIn)
Weitere Verfasser: Huang, Chenrong (VerfasserIn), Zeng, Xiaoqin (VerfasserIn), Zhang, Jiande (VerfasserIn), Han, Lei (VerfasserIn), Qian, Ying (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Novel Location Privacy Protection Scheme with Generative Adversarial Network 2020 Wang, Wenxi
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks 2020 Xie, Shengxu
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanon 2020 Ayoub, A.
The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, Lebanon 2020 Ayoub, A.
Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure 2020 Murad, Miada
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph 2020 Lian, Yongbing
Distributed Differential Privacy Protection System for Personalized Recommendation 2020 Lv, Zongsheng
Research on High Reliability Planning Method in Electric Wireless Network 2020 Tang, Zewei
Research on Service Support Ability of Power Wireless Private Network 2020 Chen, Yu
Research Character Analyzation of Urban Security Based on Urban Resilience Using Big Data Method 2020 Chen, Yi
Key Factors Affecting Blockchain Adoption in Organizations 2020 Mohammed, Abubakar
Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System 2020 Tu, Yuanfei
Optimizing the Efficiency of Machine Learning Techniques 2020 Ullah, Anwar
Community Detection Based on DeepWalk in Large Scale Networks 2020 Chen, Yunfang
Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systems 2020 Al-nabhan, Najla
A Click Fraud Detection Scheme Based on Cost-Sensitive CNN and Feature Matrix 2020 Liu, Xinyu
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprises 2020 Ayoub, A.
Security Analysis and Improvement on Kerberos Authentication Protocol 2020 Yuan, Guangyao
Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerial Video 2020 Wang, Li
On the Character Relations Between Nodes for Data Forwarding in Mobile Oppertunistic Networks 2020 Zou, Runtong
Alle Artikel auflisten