Skip to Main Content Area
  • CPS-VO
    • Contact Support
      
 
Not a member?
Click here to register!
Forgot username or password?
 
logo
logo
Science of Security VO
  • Home
  • Archive
  • About
  • Search
  • Calendar
  • Members
  • Contact Us
  • Forums
  • Files
CPS-VO » Science of Security VO » HARDWARE-BASED SECURITY PROTOCOLS

Hardware-Based Security Protocols

biblio

Visible to the public Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations

Submitted by David Garlan on Wed, 09/17/2014 - 6:30pm
  • Architectures
  • Architectures
  • Modeling
  • Science of Security
  • Validation and Verification
  • CPS Technologies
  • Foundations
  • Hardware Security Implementation
  • validation and verification
  • Self-Adaptation
  • Security in Hardware
  • Science of Security
  • Probabilistic Model Checking
  • modeling
  • Logic and Verification
  • Hardware-Based Security Protocols
  • ACM CCS
  • foundations
  • Formal Security Models
  • Formal Methods and Theory of Security
  • Denial-of-Service
  • cyber security
  • CPS Technologies
  • Architectures
  • ACM CCS
  • Hardware-Based Security Protocols
  • Cyber Security
  • Formal Security Models
  • Formal Methods and Theory of Security
  • Logic and Verification
  • Hardware Security Implementation
  • Security in Hardware

Terms of Use  |  ©2023. CPS-VO