共 50 条
- [31] Model Checking the IKEv2 Protocol Using Spin 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 288 - 294
- [32] Model checking in practice: Analysis of Generic Bootloader using SPIN FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4789 : 232 - +
- [33] Safety property verification using sequential SAT and bounded model checking IEEE DESIGN & TEST OF COMPUTERS, 2004, 21 (02): : 132 - 143
- [34] Model checking security pattern compositions USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 80 - 89
- [35] LTL model checking for security Protocols 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 385 - +
- [38] Security Verification of Industrial Control Systems using Partial Model Checking 2020 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING, FORMALISE, 2020, : 98 - 108
- [39] Security Verification for Cyber-Physical Systems Using Model Checking IEEE ACCESS, 2021, 9 : 75169 - 75186
- [40] Security analysis of RFID authentication for pervasive systems using model checking 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +