Model based security verification of protocol implementation
暂无分享,去创建一个
[1] Ousmane Koné,et al. Test generation for interworking systems , 2000, Comput. Commun..
[2] Ferhat Khendek,et al. Compositional Testing of Communication Systems , 2006, TestCom.
[3] David Lee,et al. Formal methods and tools for testing communication protocol system security , 2008 .
[4] David Lee,et al. A model-based approach to security flaw detection of network protocol implementations , 2008, 2008 IEEE International Conference on Network Protocols.
[5] Ousmane Koné,et al. Network Securing against Threatening Requests , 2011, DPM/SETOP.
[6] Ousmane Koné. Conformance testing to real-time communications systems , 2002, Comput. Commun..
[7] Ousmane Koné,et al. Security and Robustness by Protocol Testing , 2014, IEEE Systems Journal.
[8] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.
[9] Ana R. Cavalli,et al. An EFSM-Based Intrusion Detection System for Ad Hoc Networks , 2005, ATVA.
[10] David Lee,et al. Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[11] Ousmane Koné,et al. A Robustness Testing Method for Network Security , 2011, ICGS3/e-Democracy.
[12] Alexandre Petrenko,et al. Confirming configurations in EFSM testing , 2004, IEEE Transactions on Software Engineering.
[13] Mercedes G. Merayo,et al. Extending EFSMs to Specify and Test Timed Systems with Action Durations and Time-Outs , 2008, IEEE Transactions on Computers.
[14] Richard Lai,et al. A survey of communication protocol testing , 2002, J. Syst. Softw..