Login / Signup

Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems.

Adi SosnovichOrna GrumbergGabi Nakibly
Published in: CAV (2013)
Keyphrases
  • security vulnerabilities
  • distributed systems
  • computer systems
  • data mining
  • database systems
  • data access