Article,

Runtime verification using policy-based approach to control information flow.

.
Int. J. Secur. Networks, 8 (4): 212-230 (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews