1. Al-Shaer, E., Hamed, H.: Management and translation of filtering security policies. In: Proc. 38th Int. Conf. Communications (ICC 2003), May 2003, pp. 256–260. IEEE Computer Society Press, Los Alamitos (2003)
2. Bhargavan, K., Chandra, S., McCann, P.J., Gunter, C.A.: What packets come: automata for network monitoring. In: POPL, pp. 206–219 (2001)
3. Bishop, S., Fairbairn, M., Norrish, M., Sewell, P., Smith, M., Wansbrough, K.: Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations. In: POPL, Charleston, South Carolina, USA, pp. 55–66. ACM Press, New York (2006),
http://www.cl.cam.ac.uk/users/pes20/Netsem/tech-paper.pdf
4. Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Transactions on Software Engineering 4, 178–187 (1978)
5. Chan, W.Y.L., Vuong, S.T., Ito, M.R.: An improved protocol test generation procedure based on UIOS. In: SIGCOMM, pp. 283–294 (1989)