Login / Signup

Verifying redundant-check based countermeasures: a case study.

Thibault MartinNikolai KosmatovVirgile Prevosto
Published in: SAC (2022)
Keyphrases
  • countermeasures
  • information security
  • case study
  • rural areas
  • test bed
  • java card
  • machine learning
  • model checking
  • cyber attacks
  • security measures
  • database
  • wireless sensor networks