Login / Signup

A model-based approach to security flaw detection of network protocol implementations.

Yating HsuGuoqiang ShuDavid Lee
Published in: ICNP (2008)
Keyphrases