搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Reto E. Haeni
DOI:
关键词:
摘要:
,2005, 引用: 5
,2014, 引用: 5
Lecture Notes in Computer Science,2005, 引用: 41
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration,2009, 引用: 5
International Journal of Digital Crime and Forensics,2014, 引用: 116
ieee international workshop on policies for distributed systems and networks,2007, 引用: 40
formal methods,2009, 引用: 3
IEEE Journal on Selected Areas in Communications,2009, 引用: 29
Proceedings of the 3rd ACM workshop on Artificial intelligence and security,2010, 引用: 4
,2012, 引用: 2