共 15 条
[1]
Junzhou L., Jun S., Guanqun G., Guanqun, From Petri Nets to Formal Description Techniques and Protocol Engineering, Journal of Software, 11, 5, pp. 606-615, (2000)
[2]
Kumar S., Classification and Detection of Computer Intrusions, Phd Thesis Department of Computer Sciences, 19, 8, pp. 21-71, (1995)
[3]
Slagell M., A Critique of the 1998 and 1999 DARPA Intrusion Detection System L, evalualions as Performed by Lincoln Lahoratory, JACM Trans On Information and System Security, 2000, 3, 4, pp. 262-294, (2000)
[4]
Guiping S., Sha S., Research of security protocols analysis language based on coloured Petri net, Microcomputer & Its Applications, 30, 15, pp. 1-7, (2011)
[5]
Jun Z., Changguo G., Quanyuan W., A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN, Journal of Computer Research and Development, 48, 12, pp. 2276-2289, (2011)
[6]
Xiao-Ling S., Ning W., Yan L., Yan, Fuzzy Reasoning by Using <arked Fuzzy Petri Nets, Computer Engineering & Science, 34, 3, pp. 152-157, (2012)
[7]
Abouelabbas G., Georg F., Component based colored Petri net model for Ethernet based networked control systems, Proceedings of IEEE Symposium On Emerging Technologies and Factory Automation, pp. 1100-1103, (2008)
[8]
Lianzhang Z., Xiuhu S., Colored petri net based workflow model mapping, Proceedings of 3rd International Conference On Biomedical Engineering and Informatics, pp. 2743-2747, (2010)
[9]
Jian-Jun D., Zhong-Fu W., Ming C., Attack modeling using colored Petri net and alerts correlation algorithms design, Journal of Chongqing University, 34, 4, pp. 118-124, (2011)
[10]
Mohamed B., Pavol B., Walter S., Colored Petri Net inversion for Backward reachability analysis, IFAC Proceedings Volumes, 2, 1, pp. 227-232, (2009)