Login / Signup
Introducing the truly chaotic finite state machines and their applications in security field.
Christophe Guyeux
Qianxue Wang
Xiaole Fang
Jacques M. Bahi
Published in:
CoRR (2017)
Keyphrases
</>
finite state machines
finite state automata
model checking
intrusion detection
database
access control
initial conditions
statistical databases
information security
digital circuits
encryption scheme
regular expressions
network security
cellular automata
data sources
hidden markov models
databases