Issue No. 05 - May (2016 vol. 49)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2016.131
Jeffrey Voas , IEEE Fellow
Kim Schaffer , National Institute of Standards and Technology
Seven experts weigh in on the current use and practice of formal methods in cybersecurity.
Frequency modulation, Software engineering, Computer security, Computational modeling, NIST,formal methods, Cybertrust, security, cybersecurity
Jeffrey Voas, Kim Schaffer, "Insights on Formal Methods in Cybersecurity", Computer, vol. 49, no. , pp. 102-105, May 2016, doi:10.1109/MC.2016.131