Author:
Beaulaton Delphine,Cristescu Ioana,Legay Axel,Quilbeuf Jean
Publisher
Springer International Publishing
Reference13 articles.
1. Amazon key. https://www.amazon.com/key . Accessed 22 June 2018
2. Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium (2017)
3. Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: 4th SEFM Conference (2006)
4. Beaulaton, D., et al.: A language for analyzing security of IoT systems. In: 13th SOSE Conference (2018)
5. Lecture Notes in Computer Science;S Bensalem,2012
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Refinement of Systems with an Attacker Focus;Formal Methods for Industrial Critical Systems;2023
2. Predicate Abstraction and Such...;Formal Methods for Industrial Critical Systems;2018