Sign in

Approaches to Modelling Security Scenarios with Domain-Specific Languages.

Phillip J. BrookeRichard F. PaigeChristopher Power
Published in: Security Protocols Workshop (2012)
Keyphrases
  • real world
  • training data
  • programming language
  • computer security
  • neural network
  • website
  • training set
  • network security
  • strengths and weaknesses