Login / Signup

Modeling and verifying EPC network intrusion system based on timed automata.

Yan SunTin-Yu WuXiaoqiong MaHan-Chieh Chao
Published in: Pervasive Mob. Comput. (2015)
Keyphrases