Login / Signup
A formal methodology for integral security design and verification of network protocols.
Jesus Diaz
David Arroyo
Francisco de Borja Rodríguez
Published in:
J. Syst. Softw. (2014)
Keyphrases
</>
network protocols
formal methods
intrusion detection
data mining
information systems
information security