共 19 条
[1]
Almulhem A., 2011, 2011 World Congress on Internet Security (WorldCIS-2011), P223
[2]
Alomari Wala'a, 2015, COMPUTER INFORM SCI, V8, P13, DOI [10.5539/cis.v8n3p13, DOI 10.5539/CIS.V8N3P13]
[3]
[Anonymous], 2012, WORLD APPL SCI J, DOI DOI 10.5829/idosi.wasj.2012.19.04.1837
[4]
Huang Yao-Wen, 2005, WEB APPL SECURITY PR, DOI [10.1007/0-387-24006-3_12, DOI 10.1007/0-387-24006-3_12]
[5]
Khaet F., 2017, ACM INT C P SERIES, V13
[6]
The Formal Logical Analysis of the Correctness of the Specifications of Network Protocol SIP
[J].
2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM),
2016,
:279-283
[7]
Loktev A. A., 2016, IEEE 2016 INT SIB C, P1, DOI [10.1109/SIBCON.2016.7491683, DOI 10.1109/SIBCON.2016.7491683]
[8]
Loktev D.A., 2015, CONT ENG SCI, V8, P789
[9]
Loktev D.A., 2015, CONT ENG SCI, V8, P467
[10]
Rajabzadeh T., 2010, 6 INT C WIR COMM NET, P139