Login / Signup
A security modeling and verification method of embedded software based on Z and MARTE.
Xinwen Hu
Yi Zhuang
Fuyuan Zhang
Published in:
Comput. Secur. (2020)
Keyphrases
</>
embedded software
verification method
temporal logic
model checking
sequence diagrams
development projects
software architecture
access control
network security
embedded systems
case study
intrusion detection
information security
security requirements
data management
high level
databases