Sign in

Runtime monitoring and verification of systems with hidden information.

Doron Drusinsky
Published in: Innov. Syst. Softw. Eng. (2014)
Keyphrases
  • hidden information
  • computer systems