First Results of a Formal Analysis of the Network Time Security Specification.
Kristof TeichelDieter SiboldStefan MiliusPublished in: SSR (2015)
Keyphrases
- formal analysis
- ban logic
- formal methods
- network management
- security threats
- intrusion detection
- wireless sensor networks
- security measures
- computer networks
- network traffic
- network structure
- cyber attacks
- enterprise network
- intrusion detection and prevention
- security requirements
- key management
- low cost
- sensor networks
- buffer overflow
- protocol specification
- virtual private network
- knowledge base