Login / Signup
Verifying redundant-check based countermeasures: a case study.
Thibault Martin
Nikolai Kosmatov
Virgile Prevosto
Published in:
SAC (2022)
Keyphrases
</>
countermeasures
information security
case study
rural areas
test bed
java card
machine learning
model checking
cyber attacks
security measures
database
wireless sensor networks