Author: Sarrab Mohamed
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.8, Iss.4, 2013-12, pp. : 212-230
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Rewriting-Based Techniques for Runtime Verification
By Roşu Grigore
Automated Software Engineering, Vol. 12, Iss. 2, 2005-04 ,pp. :