Towards the Automated Verification of Cyber-Physical Security Protocols:
  Bounding the Number of Timed Intruders

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders

Papers citing "Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders"