2 research outputs found

    Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines

    No full text
    corecore