A new security evaluation method using regular grammar to describe the required security mechanisms against software threats
Keyword(s):
2014 ◽
Vol 686
◽
pp. 458-462
2014 ◽
Vol 1073-1076
◽
pp. 1023-1026
2012 ◽
Vol 482-484
◽
pp. 2390-2395
Keyword(s):
Keyword(s):
2012 ◽
Vol 4
(11)
◽
pp. 54-65