1 |
Brooks, C., Lee, E.A., Liu, X., Neuendorffer, S., Zhao, Y., and Zheng, H., Heterogeneous Concurrent Modeling and Design in Java, vol. 1-3, UCB/EECS-2008-28, 29, 37, EECS Dept. UC Berkeley, 2008.
|
2 |
Cruickshank, K. J., Michael, J. B., and Shing, M., "A Validation Metrics Framework for Safety-Critical Software- Intensive Systems," Proc. of the 2009 IEEE International Conference on System of Systems Engineering, NM, USA, pp. 1-8, 2009.
|
3 |
Glinz, M., Berner, S., and Joos, S., "Object oriented modeling with ADORA." Information Systems, vol. 27, Issue 6, pp. 425-444, 2002.
DOI
ScienceOn
|
4 |
US-CERT, Multiple DNS implementations vulnerable to cache poisoning, Vulnerability Note VU#800113, United States Computer Emergency Readiness Team, 2008.
|
5 |
Householder, A and King, B, Securing an Internet Name Server, Coordination Center, 2002.
|
6 |
IEEE, Software verification and validation, IEEE Std. 1012-2004, pp. 5-11, 2004.
|
7 |
Mogyorodi, G., "Requirement-based Testing: An Overview," Proc. of the 39th International Conference and Exhibition on Technology of Object-oriented Languages and Systems, CA, USA, pp. 286-295, 2001.
|
8 |
Security Associates Institute, Attacking the DNS Protocol- Security Paper v2, SAI, 2003.
|
9 |
Seybold, C. and Meier, S., "Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models," Proc. of the 12th Asia-Pacific Software Engineering Conference, Taipei, Taiwan, pp. 408-420, 2005.
|
10 |
Tsai, W., Chen, Y., and Paul, R., "Specification-Based Verification and Validation of Web Services and Serviceoriented Operating Systems," Proc. of the 10th IEEE International Workshop on Object-oriented Real-Time Dependable Systems, AZ, USA, pp. 139-147, 2005.
|
11 |
IEEE, Guide for developing system requirements specifications, IEEE Std. 1233-1998, IEEE, 1998.
|
12 |
IEEE, Glossary of software engineering terminology, IEEE Std. 610.12-1990, IEEE, pp. 80, 1990.
|