共 50 条
- [1] An approach to analyze software security requirements in ABAC model [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
- [2] GSM security [J]. ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 555 - 561
- [3] Security Management in Kerberos V5 for GSM Network [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 682 - +
- [4] Analyzing the Security in the GSM Radio Network Using Attack Jungles [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 : 60 - +
- [5] Automata-Based Approach to Design and Analyze Security Policies [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
- [6] Grid of security: a new approach of the network security [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 67 - 72
- [7] Network traffic exploration application: A tool to assess, visualize, and analyze network security events [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 181 - 196
- [8] The Security Supervision System for College's Dormitory based on GSM Network [J]. 2010 INTERNATIONAL CONFERENCE ON EDUCATION AND SPORTS EDUCATION, VOL 1, 2010, : 113 - 116
- [9] A Comprehensive Approach for Network Security [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426