共 29 条
[1]
Alur R., 2017, SIGACT News, V48, P55
[2]
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification
[J].
FM 2015: FORMAL METHODS,
2015, 9109
:73-89
[3]
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[6]
Cassandras C.G., 2009, INTRO DISCRETE EVENT, V2nd ed.
[7]
Supervisory control and reactive synthesis: a comparative introduction
[J].
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS,
2017, 27 (02)
:209-260
[8]
Hangju Cho, 1989, Mathematics of Control, Signals, and Systems, V2, P47, DOI 10.1007/BF02551361
[9]
Holzmann G. J., 1991, DESIGN VALIDATION CO
[10]
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
[J].
2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS,
2015,
:1-12