A bottom-up approach to verifiable embedded system...

A bottom-up approach to verifiable embedded system information flow security

Ma, Bo, Mu, Dejun, Mao, Baolei, Hu, Wei
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
8
Language:
english
Journal:
IET Information Security
DOI:
10.1049/iet-ifs.2012.0342
Date:
January, 2014
File:
PDF, 259 KB
english, 2014
Conversion to is in progress
Conversion to is failed