![](/img/cover-not-exists.png)
A bottom-up approach to verifiable embedded system information flow security
Ma, Bo, Mu, Dejun, Mao, Baolei, Hu, WeiVolume:
8
Language:
english
Journal:
IET Information Security
DOI:
10.1049/iet-ifs.2012.0342
Date:
January, 2014
File:
PDF, 259 KB
english, 2014