{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2023,8,25]],“日期时间”:“2023-08-25T21:25:43Z”,“时间戳”:16929987438433},“引用计数”:39,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print”:{“日期部分”:[[2011,7]]},“DOI”:“10.1109 \/pst.2011.5971976”,“type”:“proceedings-article”,“created”:{“date-parts”:[[2011,8,15]],“date-time”:“2011-08-15T20:33:42Z”,“timestamp”:1313440422000},“source”:”Crossref“,”is-referenced-by-count“:10,“title”:[“基于模型的系统安全量化”],“prefix”:“101109”,“author”:[{“给定”:“S.”,”“family”:“Ouchan”i“,”sequence“:”first“,“affiliation”:[]},{“given”:“Y.},{“key”:“ref38”,“doi-asserted-by”:“publisher”,“DOI”:“10.1007\/s00766-009-009-0091-y”},{“key”:“ref33”,“author”:“ross”,“year”:“0”,“journal-title”:“工程应用的模糊逻辑”}3-642-13273-5_11“},{“key”:“ref30”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1109\/INNOVATIONS.2011.5893863”},{“key”:“ref37”,“author”:“schulzrinne”,“year”:“1998”,“journal-title”:“实时流媒体协议(RTSP)美国”}35英寸,“article-title”:“计算机安全强度和风险:定量方法”,“author”:“schechter”,“year”:“2004”},{“key”:“ref34”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/s1134-010-0122-3”}SysML for Systems Engineering”,“作者”:“holt”,“year”:“2007”,“journal-title”:“Institution of Engineering and Technology Press”},{“key”:“ref12”,“author”:“holzmann”,“年”:“1991”,“日记标题”:“计算机协议的设计和验证”}、{“密钥”:“ref13”,“doi-asserted-by”:“publisher”,“doi”:“10.1007 \/s00766-009-093-9”}新闻标题“:“编写安全代码”},{“key”:“ref15”,“article-title”:“信息技术-安全技术-信息安全风险管理”,“年份”:“2008”,“新闻标题”:“国际标准化组织(ISO)”}:“publisher”,“DOI”:“10.1007\/978-3-540-45221-8_7”},{“key”:“ref18”,“DOI-asserted-by”:“publicher”,“DOI”:“101109\/ECBS.2009.25”}、{“密钥”:“ref19”,“dio-asserted-by”:”publisher“,”DOI“:”10.1109\/ECMS.2007.22“},“key“:”ref28“,”article-title“:”OMG,OMG系统建模语言(OMG SysML)规范“,“年份”:“2007年”,“新闻标题”:“Object Management Group”},{“key”:“ref4”,“doi asserted by”:“publisher”,“doi”:“10.1007\/11526841_20”},{“key”:“ref27”,“doi asserted by”:“publisher”,“doi”:“10.1109\/JPROC.2003.819611”},{“key”:“ref3”,“author”:“bauger”,“year”:“2004”,“期刊标题”:“美国安全实时传输协议(SRTP)”},{“key”:“ref6”,“doi由“:“publisher”,“DOI”:“10.1109\/COMPSAC.2008.88”},{“key”:“ref29”,“article-title”:“模糊推理系统的自动生成”,“author”:“ouchani”,“year”:“1997”}TSE.2010.36“},{“key”:“ref7”,“DOI-asserted-by”:“crossref”,“first page”:“381”,“DOI”:“10.1016\/j.infsof.2006.06.002”,“article-title”:“On The Design of More Secure Software-Intensive Systems by Use of Attack Patterns”,“volume”:”49“,”author“:”gegick“,”year“:”2007“,”journal-title“:”Inf Softw Technol“},{”key“:”ref2“,”article-title“”:“模型检查原则”,“author”:“baier”,“year”:“2008”}第页,{“key”:“ref9”,“article-title”:“软件安全保障,最新状态报告SOAR”,“author”:“goertzel”,“year”:“2007”,“journal-title“:”IATAC和DACS最新状态报告SP0700–98-D-4002“},{“key”:”ref1“,”doi-asserted-by“:”publisher“,”doi“:”10.1109 \/ICDS.2009.19“}、{“密钥”:“ref20”,“doi-assert-by”:“publisher”,“内政部”:“10.1109\/CSFW.2002.1021806”},{“key”:“ref22”,“author”:“j\u00fcrjens”,“year”:“2005”,“journal-title”:“Secure Systems Development with UML”}、{“密钥”:“ref21”,“文章标题”:“模型检查”,“年份”:“1999”}8“,”文章标题“:“使用UML进行安全系统开发的工具”,“卷”:“9”,“作者”:“j\u00fcrjens”,“年份”:“2007”,“日志标题”:“Int j Softw Tools Technol Transf”},{“key”:“ref23”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-540-30187-5_26”}},{“键”:“参考25”,“first page”:“426”,“article-title”:“SecureUML:基于UML的模型驱动安全建模语言”,“author”:“lodderstedt”,“year”:“2002”,“journal-title“:“the Proceedings of the 5th International Conferences on the Unified Modeling Language”}],“event”:{“name”:“2011年第九届国际隐私、安全与信任会议”,“location”:“蒙特利尔,QC”,“开始”:{“日期部分”:[[2011,7,19]]},“结束”:{“日期部分”:[[2011,7,21]]]},“容器标题”:[“2011第九届隐私、安全和信任国际年会”],“原标题”:[],“链接”:[{”URL“:”http:\/\/explorestating.ieee.org/ielx5\/55961997/5971950\/059771976.pdf?arnumber=55971976“,“内容类型”:“未指明”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[[2017,6,20]],“date-time”:“2017-06-20T04:44:51Z”,“timestamp”:1497933891000},“score”:1,“resource”:{primary“URL”:“http://ieeexplore.iee.org\/document\/5976\/”},”subtitle“:[],“shorttitle”:[],“已发布”:{“日期部分”:[[2011,7]]},“references-count”:39,“URL”:“http://\/dx.doi.org\/10.1109\/pst.2011.5971976”,“relationship”:{},“subject”:[],“published”:{“date-parts”:[[2011,7]]}}}