First Page | Document Content | |
---|---|---|
Date: 2014-04-30 03:10:08Cryptographic protocols Needham–Schroeder protocol Dropbox Program refinement Vulnerability VisIt Lottery Computer security Software Computing Computer network security | 2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of DenmarkAdd to Reading ListSource URL: ieee-security.orgDownload Document from Source WebsiteFile Size: 384,14 KBShare Document on Facebook |