Symmetry and model checking
Formal Methods in System Design1996Vol. 9(1-2), pp. 105–131
Citations Over TimeTop 10% of 1996 papers
Related Papers
- → AEG: Automatic Exploit Generation(2018)209 cited
- → Exploit Kits: The production line of the Cybercrime economy?(2015)33 cited
- → PExy: The Other Side of Exploit Kits(2014)24 cited
- → AEMB: An Automated Exploit Mitigation Bypassing Solution(2021)5 cited
- Evaluation of Two Host-Based Intrusion Prevention Systems(2005)