Keyphrases
Vulnerability
100%
Communication Protocol
100%
IEEE 802.16
100%
TLA+
100%
Vulnerability Analysis
100%
Manual Processes
50%
Security Properties
50%
Denial of Service
50%
Denial-of-service Attack
50%
Air Interface
50%
Formal Methods
50%
State Space Explosion
50%
Network Vulnerability
50%
Property Checking
50%
Attacker Capabilities
50%
Interface Protocol
50%
Computer Science
Denial-of-Service
100%
Network Protocols
100%
Vulnerability Assessment
100%
IEEE 802.16
100%
State Space
50%
Authentication
50%
Security Properties
50%
Attacker Model
50%
Air Interface Protocol
50%
Case Study
50%
Manual Process
50%