1. |
S. Paulus, N. G. Mohammadi,T. Weyer, “Trustworthy Software Development,” inProceedings of the 14th IFIP International Conference on Communications and MultimediaSecurity, pp. 233-247, Magdeburg, Germany, September 2013
|
2. |
H. Mei, G. Huang,T. Xie, “Internetware: A Software Paradigm for Internet Computing,”IEEE Computer Society, Vol. 45, No. 6, pp. 26-31, June 2012
|
3. |
S. Maza, “Un système de vérification et de validation de la sécurité et l’intégration évolutive adaptative de la protection dans les systèmes d’informations avancés,”Thèse de doctorat, 2019
|
4. |
B. K.Ayaswal and P. C. Patton,Design for Trustworthy Software: Tools, Techniques and Methodology for Developing Robust Software, Prentice Hall, 2011
|
5. |
P. Yolum and M. P. Singh, “Engineering Self-Organizing Referral Networks for Trustworthy Service Selection,”IEEE Transactions on Systems, Man and Cybernetics,Part A: Systems and Humans, Vol. 35, No. 3, pp. 396-407, 2005
|
6. |
V. O. Safonov,Using Aspect-Oriented Programming for Trustworthy Software Development, Wiley-Interscience, 2008
|
7. |
Z. Yan and G. Goel, “An Adaptive Trust Control Model for A Trustworthy Component Software Platform,” InProceedings of the 4th International Conference on Autonomic and Trusted Computing, pp. 226-238, Hong Kong, China, 2007
|
8. |
F. Stephany, F. Braesemann,M. Graham.“Coding Together-Coding Alone: The Role of Trust in Collaborative Programming,”Information, Communication & Society, pp. 1-18, 2020
|
9. |
P. O’Kane, A. Smith,M. P. Lerman, “Building Transparency and Trustworthiness in Inductive Research through Computer-Aided Qualitative Data Analysis Software,”Organizational Research Methods, Vol.24, No.1, pp. 104-139, 2021
|
10 |
B. Wang, Y. Chen, S. Zhang,H. Wu, “Updating Model of Software Component Trustworthiness based on Users Feedback,”IEEE Access, Vol. 7, pp. 60199-60205, 2019
|
11 |
J. Tian and Y. Guo. “Software Trustworthiness Evaluation Model Based on A Behaviour Trajectory Matrix,”Information and Software Technology, Vol. 119, pp. 106233, 2020
|
12 |
N. Leveson and J. Stolzy, “Safety Analysis using Petri Nets,”IEEE Transactions on Software EngineeringVol. 13, No. 3, pp. 386-397, 1987
|
13 |
D. V. Leontev, D. I. Kharitonov, D. S. Odyakova,R. V. Parakhin, “An Approach to using Templates for Modeling Exceptions in Terms of Petri Nets,”. inProceedings of the 9th Computer Science On-line Conference, Vol. 1: Intelligent Algorithms in Software Engineering,pp. 233-247, Zlin, Czech Republic, 2020
|
14 |
D. I.Kharitonov and D. S. Odyakova, “Modelling Race Conditions in Multithreading Programs in Terms of Petri Nets,” IOP Conference Series: Materials Science and Engineering, Vol. 734, pp. 012030, IOP Publishing, 2020
|
15 |
D. Wang, X. Huang,X. Ma.“Formal Analysis of Smart Contract Based on Colored Petri Nets,”IEEE Intelligent Systems, Vol. 35, No. 3, pp. 19-30, 2020
|
16 |
Y. Ji, L. Cui,H. H. Huang, “BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network,” inProceedings of the 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021
|
17 |
M. Allamanis, M. Brockschmidt,M. Khademi, “Learning to Represent Programs with Graphs,” inProceedings of the Sixth International Conference on Learning Representations, Vancouver, BC, Canada, 2018, arXiv:1711.00740
|