Issue No. 05 - May (2016 vol. 49)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2016.131
Jeffrey Voas , IEEE Fellow
Kim Schaffer , National Institute of Standards and Technology
Seven experts weigh in on the current use and practice of formal methods in cybersecurity.
Frequency modulation, Software engineering, Computer security, Computational modeling, NIST