Login / Signup

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.

Vivek NigamCarolyn L. TalcottAbraão Aires Urquiza
Published in: ESORICS (2) (2016)
Keyphrases
  • security protocols
  • information systems
  • machine learning
  • decision making
  • mobile devices
  • social network analysis