ГОСТ Р 70462.1—2022
[
[84]Roy N., Shen S., Hassanieh H., Choudhury R.R. Inaudible voice commands: The long-range attack and defense.
USENIX Association, 15th USENIX Symposium on Networked Systems Design and Implementation. 2018,
ISBN 978-1-939133-01-4, доступно no
https://synrg.csl.illinois.edu/papers/lipread_nsdi18.pdf
[85] Roy N., Hassanieh H., Roy Choudhury R. Backdoor: Making microphones hear inaudible sounds. ACM, Proceedings of
the 15th Annual International Conference on Mobile Systems, Applications and Services. 2017, ISBN 978-1-4503-
6661-8
[
86
]
Song L.P., Mittal P. Inaudible voice commands. ArXiv. 2017, доступно no
https://arxiv.org/abs/1708.07238
[87] Esmaeilpour M., Cardinal P., Koerich A.L. A Robust Approach for Securing Audio Classification Against Adversarial
Attacks. ArXiv. 2019, доступно no
https://arxiv.org/abs/1904.10990
88
]
Winskel G., Theformal semantics ofprogramming languages: an introduction. MITPress. 1993, ISBN 9780262231695
[89]Hoare C.A. An axiomatic basis for computer programming. ACM, Communications of the ACM, Vol. 12. 1969,
ISSN 0001-0782
[90]Cousot P., Cousot R. Static determination of dynamic properties of programs. Proceedings of the Second
International Symposium on Programming. 1976
[91] Logozzo F., Frahndrich M. Pentagons: a weakly relational abstract domain for the efficient validation of array
accesses. ACL, Proceedings of the 2008 ACM symposium on Applied computing. 2008, ISBN 978-1-59593-753-7
[92]Mine A. The octagon abstract domain. Springer, Higher-Order and Symbolic Computation, Vol. 19. 2006
[93] Mukherjee R., Schrammel P, Haller L., Kroening D., Melham T. Lifting CDCL to Templatebased Abstract Domains for
Program Verification. Springer, Automated Technology for Verification and Analysis. 2017, ISBN 978-3-319-68167-
2
[94] Cousot P, Halbwachs N.Automatic Discovery of Linear RestraintsAmong Variables ofa Program. ACM, Proceedings
of the 5th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages. 1978
[95]Goubault E., Le Gall T, Putot S.An Accurate Join for Zonotopes, Preserving Affine Input/Output Relations. Electronic
Notes in Theoretical Computer Science, Vol. 287. 2012
[96]Specht F., Otto J., Niggemann O., Hammer B. Generation of Adversarial Examples to Prevent Misclassification of
Deep Neural Network based Condition Monitoring Systems for Cyber-Physical Production Systems. IEEE, 16th
International Conference on Industrial Informatics. 2018
[97]ISO/IEC 2382:2015
Information technology Vocabulary
[98]ISO/IEC/IEEE 15288:2015
Software and systems engineering Systems and software engineering System life
cycle processes
[99]ISO/IEC 25000:2014
Systems and software engineering Systems and software Quality Requirements and
Evaluation (SQuaRE) Guide to SQuaRE
[
100
]
ISO/IEC/IEEE 26513:2017Systems and software engineering Requirements for testers and reviewers of
information for users
27