Login / Signup
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.
Vivek Nigam
Carolyn L. Talcott
Abraão Aires Urquiza
Published in:
ESORICS (2) (2016)
Keyphrases
</>
security protocols
information systems
machine learning
decision making
mobile devices
social network analysis