Survey of Approaches and Techniques for Security Verification of Computer Systems.
Ferhat ErataShuwen DengFaisal ZaghloulWenjie XiongOnur DemirJakub SzeferPublished in: ACM J. Emerg. Technol. Comput. Syst. (2023)
Keyphrases
- computer systems
- computer security
- information processing systems
- data processing
- operating system
- communication systems
- information systems
- hardware and software
- cyber attacks
- information security
- computer networks
- computer technology
- network security
- human beings
- cryptographic protocols
- intrusion detection system
- access control
- distributed systems
- countermeasures
- mobile devices
- high end
- machine learning