Sign in

Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols.

Karim HossenRoland GrozJean-Luc Richier
Published in: ICST Workshops (2011)
Keyphrases
  • formal model
  • computer systems