Login / Signup

A formal methodology for integral security design and verification of network protocols.

Jesus DiazDavid ArroyoFrancisco de Borja Rodríguez
Published in: J. Syst. Softw. (2014)
Keyphrases
  • network protocols
  • formal methods
  • intrusion detection
  • data mining
  • information systems
  • information security