The Community for Technology Leaders
Green Image
Issue No. 05 - May (2016 vol. 49)
ISSN: 0018-9162
pp: 102-105
Jeffrey Voas , IEEE Fellow
Kim Schaffer , National Institute of Standards and Technology
Seven experts weigh in on the current use and practice of formal methods in cybersecurity.
Frequency modulation, Software engineering, Computer security, Computational modeling, NIST,formal methods, Cybertrust, security, cybersecurity
Jeffrey Voas, Kim Schaffer, "Insights on Formal Methods in Cybersecurity", Computer, vol. 49, no. , pp. 102-105, May 2016, doi:10.1109/MC.2016.131
98 ms
(Ver 3.3 (11022016))