共 50 条
- [21] Model-checking the Flooding Time Synchronization Protocol 2009 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-3, 2009, : 422 - 429
- [24] A Module Level Security Evaluation Method Based on Model Checking PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1165 - 1170
- [25] Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 319 - 328
- [26] Analyzing Hardware Security Properties of Processors through Model Checking 2020 33RD INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2020 19TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2020, : 107 - 112
- [27] Software Model Checking for Mobile Security - Collusion Detection in K MODEL CHECKING SOFTWARE, SPIN 2018, 2018, 10869 : 3 - 25
- [29] Improvement of SAT-based Model Checking of Security Protocols 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 223 - 227