Cargando…
A Model Based Security Testing Method for Protocol Implementation
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an...
Autores principales: | Fu, Yu Long, Xin, Xiao Long |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/ https://www.ncbi.nlm.nih.gov/pubmed/25105163 http://dx.doi.org/10.1155/2014/632154 |
Ejemplares similares
-
Implementation and security analysis of practical quantum secure direct communication
por: Qi, Ruoyang, et al.
Publicado: (2019) -
Mobile cloud computing: models, implementation, and security
por: Qiu, Meikang, et al.
Publicado: (2017) -
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods
por: Merkow, Mark S, et al.
Publicado: (2011) -
Security Considerations and Recommendations in Computer-Based Testing
por: Al-Saleem, Saleh M., et al.
Publicado: (2014) -
Model for successful development and implementation of Cyber Security Operations Centre (SOC)
por: Abd Majid, Maziana, et al.
Publicado: (2021)