Applying protocol analysis to security device interfaces | IEEE Journals & Magazine | IEEE Xplore