搜索资源列表
model-checking
- a set of model checking tutorial
435
- 优化基于模型检验的测试生成Optimal test generation based on model checking-Optimal test generation based on model checking
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
2.-Model-Checking-more-in-depth
- Security analysis and verification by model checking tools
3.-Case-Study-1---Web-Security
- Security analysis and verification by model checking tools
4.-Case-Study-2---MOPS
- Security analysis and verification by model checking tools
4.2.2.7-Lab---Building-an-Ethernet-Crossover-Cabl
- Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted. As per the OSI model,
Study-of-Hydraulic-Model-Calibration
- 本文以管网阻力系数校核、节点流量实时校核与漏损定位为主要研究内容,提出了基于经验信息的加权最小二乘管网阻力系数校核法。-In this paper, the pipe network drag coefficient checking, checking and real-time traffic node leakage positioned as the main research content is proposed based on the weighted least squares
Huaneng-Power-
- 华能东方电厂1号机励磁系统建模试验报告,通过对励磁调节器各环节测试,进行仿真实验,并经过模型校核。-Huaneng Power Plant No.1 Oriental Excitation System Modeling experiments reported by all sectors of the field regulator testing, simulation experiment, and after checking the model.