共 50 条
- [32] A protocol layer survey of network security ADVANCES IN COMPUTERS, VOL 64: NEW PROGRAMMING PARADIGMS, 2005, 64 : 109 - 158
- [33] Security properties and CSP 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 174 - 187
- [34] Research on Network Security Protection System based on Dynamic Modeling PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1602 - 1605
- [35] Checkmate network security modeling DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 214 - 226
- [36] TII protocol modeling and analysis based on colored Petri network Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (12): : 29 - 34
- [37] Stochastic protocol modeling for anomaly based network intrusion detection IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 3 - 12
- [38] General structure of network security protocol and the analysis of its security Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2000, 27 (02): : 90 - 94
- [39] Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2, 2020, 147 : 350 - 360
- [40] Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 39 - 44