1 |
Hui Kang, Xiuli Yang, Sinmiao Yuan, "Modeling and Verification of Web Services Composition based on CPN," npc, pp.613-617, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), 2007.
|
2 |
Jaegeol Yim, Seunghwan Jeong, Jaehun Joo, "Colored Petri Net Representation of RDF Models," fgcns, vol. 5, pp.46-51, 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008.
|
3 |
Lian-zhang Zhu, Hua Zhang, "Queuing Network Models Analysis Based on CPN," icic, vol. 2, pp.269-272, 2009 Second International Conference on Information and Computing Science, 2009.
|
4 |
Vijay Gehlot, "Systems Modeling and Analysis Using Colored Petri Nets", IEEE Systems Conference 2008.
|
5 |
Xiang Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li, "Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor," IEEE icpads, pp.220-227, 2009 15th International Conference on Parallel and Distributed Systems, 2009.
|
6 |
Xinyou Zhang, Chengzhong Li, Wenbin Zheng, "Intrusion Prevention System Design," cit, pp.386-390, Fourth International Conference on Computer and Information Technology (CIT'04), 2004.
|
7 |
Yanxiang He; Tao Liu; Hai Zhong; Qi Xiong, "A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks" FCST(Frontier of Computer Science and Technology) '09. Fourth International Conference, pp.548 - 552, 2009.
|
8 |
Yongwei Wang; Shaowen Yao; Ying Zhao; Mingtian Zhou, "CPN modeling and analysis of L2TP" Computer Networks and Mobile Computing, pp.281 - 288, 2001.
|
9 |
http://www.daimi.au.dk/CPnets/intro/example_indu.html
|
10 |
안정철 " 침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계" 한국정보보호학회, 정보보호학회논문지, 제14권 제6호 2004.12, page(s): 91-103
|
11 |
이문구 "침입차단 방화벽 시스템을 위한 FTP 프록시 모델의 설계 및 안정성 검증" 숭실대학교 대학원, 컴퓨터학과, 박사학위논문, 1999. 12.
|