Login / Signup

A bottom-up approach to verifiable embedded system information flow security.

Dejun MuWei HuBaolei MaoBo Ma
Published in: IET Inf. Secur. (2014)
Keyphrases