Login / Signup
A bottom-up approach to verifiable embedded system information flow security.
Dejun Mu
Wei Hu
Baolei Mao
Bo Ma
Published in:
IET Inf. Secur. (2014)
Keyphrases
</>
information flow
information security
social networks
flow analysis
information flows
communication networks
functional modules
supply chain
security issues
flow graph
multi context systems
sufficient conditions
social network analysis
multi threaded