Author:
Alam Masoom,Malik Saif-ur-Rehman,Javed Qaisar,Khan Abid,Khan Shamaila Bisma,Anjum Adeel,Javed Nadeem,Akhunzada Adnan,Khan Muhammad Khurram
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference57 articles.
1. Alam Q, Tabbasum S, Malik S, Alam M, Tanveer T, Akhunzada A, Khan S, Vasilakos A, Buyya R (2016) Formal verification of the xDAuth protocol
2. Alienvault OSSIM http://www.alienvault.com . Accessed 13 Mar 2015
3. Allen R, Garlan D (1997) A formal basis for architectural connection. ACM Trans Softw Eng Methodol 6(3):213–249
4. Alruwaili FF, Gulliver TA (2014) SOCaaS: security operations center as a Service for Cloud Computing Environments. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 3(2):87–96
5. Baier C, Katoen J-P (2008) Principles of model checking, vol 26202649. MIT press, Cambridge
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献