Sign in

Runtime verification using policy-based approach to control information flow.

Mohamed Sarrab
Published in: Int. J. Secur. Networks (2013)
Keyphrases