From post

Model Checking Computational Tree Logic Using Sticker Automata.

, , , и . BIC-TA (1), том 681 из Communications in Computer and Information Science, стр. 12-20. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mimic Encryption System for Network Security., , , и . IEEE Access, (2018)CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing., , , и . Sensors, 22 (16): 6044 (2022)The Algorithms of Weightening Based on DNA Sticker Model., , и . ICPCSEE (2), том 902 из Communications in Computer and Information Science, стр. 250-262. Springer, (2018)An Approach on Service Component Selection and Analysis of the Resulting System Reliability., , и . CIT, стр. 1246-1250. IEEE Computer Society, (2010)GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification., , , и . TrustCom, стр. 422-433. IEEE, (2023)Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model., , , и . ICPCSEE (1), том 1451 из Communications in Computer and Information Science, стр. 283-299. Springer, (2021)Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors., , , , и . ICPCSEE (1), том 1451 из Communications in Computer and Information Science, стр. 180-189. Springer, (2021)GraphNEI: A GNN-based network entity identification method for IP geolocation., , , , , , , , , и 5 other автор(ы). Comput. Networks, (ноября 2023)Detecting air-gapped attacks using machine learning., , , , , , и . Cogn. Syst. Res., (2019)An intrusion detection algorithm for wireless networks based on ASDL., , и . IEEE CAA J. Autom. Sinica, 5 (1): 92-107 (2018)