购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1]Avizienis A,Laprie J C,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing:IEEE Transactions on Dependable and Secure Computing,2004.

[2]Sommerville I.Software engineering.Pearson,2015.

[3]SOFTWARE 2015:A national software strategy to ensure U.S.security and competitiveness report of the 2nd national software summit,April 29,2005.

[4]Butler M,Leuschel M,Presti S,et al.The use of formal methods in the analysis of trust.Lecture Notes in Computer Science,2004,2995:333-339.

[5]Mulligany D K,Schneider F B.Doctrine for cybersecurity.Technical Report,Cornell University,2011(5).

[6]Hoos H.Programming by optimization.Communications of the ACM,2012(2),55(2).

[7]Lee E A,Parks T M.Dataflow process networks.Proceedings of the IEEE,1995(5),83(5):773-801.

[8]Kang E,Jackson E,Schulte W.An approach for effective design space exploration,foundations of computer software:modeling,development,and verification of adaptive systems.Monterey Workshop,Lecture Notes in Computer Science,Springer,2010.

[9]Common Criteria for Information Technology Security Evaluation,Revision 5 in 2017.

[10]Kopetz H,Obermaisser R,Salloum C E,et al.Automotive software development for a multi-core system-on-a-chip:Fourth International Workshop on Software Engineering for Automotive Systems,2007.

[11]Wang G Q,Zhao W H.The principles of integrated technology in avionics systems.Academic Press,2020.

[12]Staron M.AUTOSAR (AUTomotive Open System ARchitecture).Automotive Software Architectures.Springer,2021.

[13]Efroni S,Harel D,Cohen I R.Reactive animation:realistic modeling of complex dynamic systems.Computer,2005(1).

[14]Bliudze S,Furic S,Sifakis J,et al.Rigorous design of cyber-physical systems—linking physicality and computation.Software&Systems Modeling,2017(12).

[15]Sifakis J.Autonomous systems—an architectural characterization.arXiv,2018(11). NAC1Hje/g74JvG5fo/mX7i5Fnw9H9jy525xTKMYBQKr5ipg2RuxVGzVdmcHVjkqc

点击中间区域
呼出菜单
上一章
目录
下一章
×