메뉴 건너뛰기




Volumn , Issue , 2006, Pages 44-49

Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL GEOMETRY; DOS; ERROR ANALYSIS; FORMAL METHODS; INTERNET; MODEL CHECKING; STATE SPACE METHODS; TELECOMMUNICATION NETWORKS;

EID: 46249123717     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPSEC.2006.320346     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 1
    • 84976730945 scopus 로고
    • Proving liveness properties of concurrent programs
    • July
    • S. Owicki and L. Lamport, "Proving liveness properties of concurrent programs," ACM TOPLAS, vol. 4, no. 3, pp. 455-495, July 1982.
    • (1982) ACM TOPLAS , vol.4 , Issue.3 , pp. 455-495
    • Owicki, S.1    Lamport, L.2
  • 5
    • 84928600233 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • C. Meadow, "A formal framework and evaluation method for network denial of service," in IEEE Computer Security Foundations Workshop, 1999.
    • (1999) IEEE Computer Security Foundations Workshop
    • Meadow, C.1
  • 6
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • _, "A cost-based framework for analysis of denial of service in networks," Journal of Computer Security, vol. 9, no. 1-2, 2002.
    • (2002) Journal of Computer Security , vol.9 , Issue.1-2
    • Meadow, C.1
  • 8
    • 46249089552 scopus 로고    scopus 로고
    • IEEE Std 802.16-2004: Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, http://standards.ieee.org/getieee802/download/802.16-2004.pdf.
    • "IEEE Std 802.16-2004: Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems," http://standards.ieee.org/getieee802/download/802.16-2004.pdf.
  • 9
    • 0028424892 scopus 로고
    • The temporal logic of actions
    • May
    • L. Lamport, "The temporal logic of actions," ACM TOPLAS, vol. 16, no. 3, pp. 872-923, May 1994.
    • (1994) ACM TOPLAS , vol.16 , Issue.3 , pp. 872-923
    • Lamport, L.1
  • 10
    • 0001867722 scopus 로고
    • The temporal logic of programs
    • A. Pnueli, "The temporal logic of programs," in IEEE FOCS, 1977.
    • (1977) IEEE FOCS
    • Pnueli, A.1
  • 11
    • 46249083600 scopus 로고
    • A formal specification and verification method for the prevention of denial of service
    • C.-F. Yu and V. D. Gligor, "A formal specification and verification method for the prevention of denial of service," in IEEE Security and Privacy Symposium, 1988.
    • (1988) IEEE Security and Privacy Symposium
    • Yu, C.-F.1    Gligor, V.D.2
  • 13
    • 0142152375 scopus 로고    scopus 로고
    • High-level specifications: Lessons from industry
    • Formal Methods for Components and Objects
    • B. Batson and L. Lamport, "High-level specifications: Lessons from industry," in Formal Methods for Components and Objects, ser. Lecture Notes in Computer Science, no. 2852, 2003, pp. 242-262.
    • (2003) ser. Lecture Notes in Computer Science , vol.2852 , pp. 242-262
    • Batson, B.1    Lamport, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.