What packets may come: automata for network monitoring
暂无分享,去创建一个
Carl A. Gunter | Satish Chandra | Karthikeyan Bhargavan | Peter J. McCann | K. Bhargavan | S. Chandra | P. McCann
[1] Mahesh Viswanathan,et al. Verisim: Formal analysis of network simulations , 2000, ISSTA '00.
[2] Martin Peschke,et al. Design and Validation of Computer Protocols , 2003 .
[3] Adam A. Porter,et al. Specification-based Testing of Reactive Software: Tools and Experiments Experience Report , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[4] Marcus J. Ranum,et al. Implementing a generalized tool for network monitoring , 1997, Inf. Secur. Tech. Rep..
[5] Vern Paxson,et al. End-to-end Internet packet dynamics , 1997, SIGCOMM '97.
[6] Mahesh Viswanathan,et al. Runtime Assurance Based On Formal Specifications , 1999, PDPTA.
[7] Vern Paxson,et al. Automated packet trace analysis of TCP implementations , 1997, SIGCOMM '97.
[8] Patrice Godefroid,et al. Model checking for programming languages using VeriSoft , 1997, POPL '97.
[9] David Lee,et al. Passive testing and applications to network management , 1997, Proceedings 1997 International Conference on Network Protocols.
[10] BerryGérard,et al. The ESTEREL synchronous programming language , 1992 .
[11] Gérard Berry,et al. The Esterel Synchronous Programming Language: Design, Semantics, Implementation , 1992, Sci. Comput. Program..
[12] Nancy A. Lynch,et al. An introduction to input/output automata , 1989 .
[13] W. Richard Stevens,et al. TCP/IP Illustrated, Volume 1: The Protocols , 1994 .
[14] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.