Combinatorial analysis of network security
暂无分享,去创建一个
Sushil Jajodia | Lynn M. Keuthan | Brian O'Berry | Steven E. Noel | Charles Hutchinson | Andy Nguyen
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[4] David Notkin,et al. Model checking large software specifications , 1996, SIGSOFT '96.
[5] Edmund M. Clarke,et al. Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..
[6] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[7] David Notkin,et al. Model checking large software specifications , 1996, SIGSOFT '96.