搜索资源列表
model-checking
- a set of model checking tutorial
435
- 优化基于模型检验的测试生成Optimal test generation based on model checking-Optimal test generation based on model checking
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
2.-Model-Checking-more-in-depth
- Security analysis and verification by model checking tools
3.-Case-Study-1---Web-Security
- Security analysis and verification by model checking tools
4.-Case-Study-2---MOPS
- Security analysis and verification by model checking tools
4.2.2.7-Lab---Building-an-Ethernet-Crossover-Cabl
- Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted. As per the OSI model,
