Login / Signup
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder.
Francis Klay
Laurent Vigneron
Published in:
Formal Aspects in Security and Trust (2008)
Keyphrases
</>
preprocessing
significant improvement
computational cost
real time
bayesian networks
benchmark datasets
machine learning methods
computationally expensive
artificial intelligence
social networks
empirical studies