Sign in

Analysis of the IBM CCA Security API Protocols in Maude-NPA.

Antonio González-BurgueñoSonia SantiagoSantiago EscobarCatherine A. MeadowsJosé Meseguer
Published in: SSR (2014)
Keyphrases
  • statistical analysis
  • data analysis
  • anomaly detection
  • operating system
  • risk analysis
  • forensic analysis