相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron
Siham Zroug et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)
A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment
Imene Ben Hafaiedh et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)
A process algebraic mutation framework with application to a vehicle charging protocol
Benjamin Aziz
VEHICULAR COMMUNICATIONS (2021)
Modeling and Analyzing an Industry 4.0 Communication Protocol
Benjamin Aziz
IEEE INTERNET OF THINGS JOURNAL (2020)
A formal model and analysis of an IoT protocol
Benjamin Aziz
AD HOC NETWORKS (2016)
Proposing and verifying a security protocol for hash function-based IoT communication system
Kun-Hee Han et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2016)
Modelling and Verification of CoAP over Routing Layer using SPIN Model Checker
Anchal J. Vattakunnel et al.
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (2016)
A practical comparison of Alloy and Spin
P. Zave
FORMAL ASPECTS OF COMPUTING (2015)
Verifying conformance of multi-agent commitment-based protocols
Mohamed El-Menshawy et al.
EXPERT SYSTEMS WITH APPLICATIONS (2013)
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol
Xin He et al.
COMPUTER STANDARDS & INTERFACES (2012)
Analysis of a clock synchronization protocol for wireless sensor networks
Faranak Heidarian et al.
THEORETICAL COMPUTER SCIENCE (2012)
Detecting Man-in-the-Middle Attacks by Precise Timing
Benjamin Aziz et al.
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES (2009)
Static analysis for the π-calculus with applications to security
C Bodei et al.
INFORMATION AND COMPUTATION (2001)