Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An extensive systematic review on the model-driven development of secure systems
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …
Engineering research area for supporting the development of secure systems. Over a …
From representation to mediation: a new agenda for conceptual modeling research in a digital world
The role of information systems (IS) as representations of real-world systems is changing in
an increasingly digitalized world, suggesting that conceptual modeling is losing its …
an increasingly digitalized world, suggesting that conceptual modeling is losing its …
Design notations for secure software: a systematic literature review
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …
notations to represent security properties and concepts in a design artifact. These notations …
A decade of model-driven security
In model-driven development, system designs are specified using graphical modeling
languages like UML and system artifacts such as code and configuration data are …
languages like UML and system artifacts such as code and configuration data are …
A deterministic approach to blind symbol estimation
H Liu, G Xu - Proceedings of 1994 28th Asilomar Conference …, 1994 - ieeexplore.ieee.org
A blind symbol estimation technique for digital communications is developed by exploiting
special data structure of the oversampled channel output. The proposed method achieves …
special data structure of the oversampled channel output. The proposed method achieves …
Data warehouse testing: A prototype-based methodology
Context Testing is an essential part of the development life-cycle of any software product.
While most phases of data warehouse design have received considerable attention in the …
While most phases of data warehouse design have received considerable attention in the …
An engineering process for develo** Secure Data Warehouses
We present a new approach for the elicitation and development security requirements in the
entire Data Warehouse (DWs) life cycle, which we have called a Secure Engineering …
entire Data Warehouse (DWs) life cycle, which we have called a Secure Engineering …
Securing manufacturing intelligence for the industrial internet of things
Widespread interest in the emerging area of predictive analytics is driving the manufacturing
industry to explore new approaches to the collection and management of data through …
industry to explore new approaches to the collection and management of data through …
Towards comprehensive requirement analysis for data warehouses: Considering security requirements
Data warehouse (DW) systems integrate data from heterogeneous sources and are used by
decision makers to analyze the status and the development of an organization. Traditionally …
decision makers to analyze the status and the development of an organization. Traditionally …
Model-Driven Development for secure information systems
Editorial: Model-Driven Development for secure information systems: Information and
Software Technology: Vol 51, No 5 skip to main content ACM Digital Library home ACM …
Software Technology: Vol 51, No 5 skip to main content ACM Digital Library home ACM …