Login / Signup
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems.
Adi Sosnovich
Orna Grumberg
Gabi Nakibly
Published in:
CAV (2013)
Keyphrases
</>
security vulnerabilities
distributed systems
computer systems
data mining
database systems
data access