Back to Results
First PageMeta Content
Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security


2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark
Add to Reading List

Document Date: 2014-04-30 03:10:08


Open Document

File Size: 384,14 KB

Share Result on Facebook
UPDATE