Login / Signup
#SAT-based vulnerability analysis of security components - A case study.
Linus Feiten
Matthias Sauer
Tobias Schubert
Alexander Czutro
Eberhard Böhl
Ilia Polian
Bernd Becker
Published in:
DFT (2012)
Keyphrases
</>
test bed
information security
security issues
security problems
information assurance
case study
security policies
network security
security requirements
computer security
building blocks
answer set programming
combinatorial problems
key management