Login / Signup
A Hybrid Vulnerability Analysis Method against Non-Security Protocols.
Yanmei Zhang
Jianming Zhu
Published in:
ICYCS (2008)
Keyphrases
</>
similarity measure
security protocols
data mining