Login / Signup
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.
Vivek Nigam
Carolyn L. Talcott
Abraão Aires Urquiza
Published in:
CoRR (2016)
Keyphrases
</>
security protocols
automated verification
software architecture
machine learning
graph theory
inference rules