Login / Signup

A Hybrid Vulnerability Analysis Method against Non-Security Protocols.

Yanmei ZhangJianming Zhu
Published in: ICYCS (2008)
Keyphrases
  • similarity measure
  • security protocols
  • data mining