Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference33 articles.
1. [1] R. Alur, K. Etessami, and M. Yannakakis, “Analysis of recursive state machines,” 13th Intenational Conference on Computer-Aided Verification (CAV), vol.2102, pp.207-220, 2001. 10.1007/3-540-44585-4_18
2. [2] M.S. Alvim, K. Chatzikokolakis, A. McIver, C. Morgan, C. Palamidessi, and G. Smith, “Axioms for information leakage,” 29th Computer Security Foundations Symposium (CSF), pp.77-92, 2016. 10.1109/csf.2016.13
3. [3] R.A. Aziz, G. Chu, C. Muise, and P. Stuckey, “#∃SAT: projection model counting,” 18th International Conference on Theory and Applications of Satisfiability Testing (SAT), vol.9340, pp.121-137, 2015. 10.1007/978-3-319-24318-4_10
4. [4] F. Besson, N. Bielova, and T. Jensen, “Hybrid Monitoring of Attacker Knowledge,” 29th Computer Security Foundations Symposium (CSF), pp.225-238, 2016. 10.1109/csf.2016.23
5. [5] N. Bielova, “Dynamic leakage-a need for a new quantitative information flow measure,” ACM Workshop on Programming Languages and Analysis for Security (PLAS), pp.83-88, 2016. 10.1145/2993600.2993607
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献