Login / Signup
A new method of verification of security protocols.
Andrew M. Mironov
Published in:
CoRR (2017)
Keyphrases
</>
similarity measure
databases
high dimensional
network traffic
security mechanisms
verification method
artificial immune algorithm