共 50 条
- [41] Formal Analysis of Security Metrics with Defensive Actions 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 458 - 465
- [42] Formal modeling and security analysis method of security protocol based on CPN Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
- [44] Investigation on Security Risk of LoRaWAN: Compatibility Scenarios IEEE ACCESS, 2022, 10 : 101825 - 101843
- [46] Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
- [49] A formal system for analysis of cryptographic encryption and their security properties SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 87 - 112
- [50] Suspicion-driven formal analysis of security requirements 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 217 - 223