Bgpy: The bgp python security simulator

J Furuness, C Morris, R Morillo, A Herzberg… - Proceedings of the 16th …, 2023 - dl.acm.org
The security of Border Gateway Protocol (BGP), and inter-domain routing in general,
remains a challenge, in spite of its well-known importance, repeated attacks and incidents …

Reliable routing in wireless sensor networks based on coalitional game theory

R Feng, T Li, Y Wu, N Yu - Iet Communications, 2016 - Wiley Online Library
Nodes in wireless sensor networks (WSNs) have the potential to be selfish without
transmitting packets in routing. This study mainly focuses on the problem of reliable delivery …

Formal analysis of the PKMv3 protocol

X Zhu, Y Xu, X Li, J Guo, H Zhu… - Mobile Networks and …, 2018 - Springer
Abstract WiMax (Worldwide Interoperability for Microwave Access, IEEE 802.16) is a
standard-based wireless technology, which uses Privacy Key Management (PKM) protocol …

[引用][C] 参数化运行时验证研究和工具实现

王哲民, 陈哲, 朱云龙, 黄志球 - 小型微型计算机系统, 2016

[引用][C] 使用模型检验自动化验证路由协议

马银雪, 陈哲, 黄志球, 黄吴丹 - 小型微型计算机系统, 2015