Login / Signup
Verifying security protocols by knowledge analysis.
Xiaoqi Ma
Xiaochun Cheng
Published in:
Int. J. Secur. Networks (2008)
Keyphrases
</>
security protocols
real time
artificial intelligence
data analysis
knowledge discovery
case study