Personensuche
X
?
Requirements Engineering: Foundation for Software Quality; Lecture Notes in Computer Science ,
3
Assessing the Understandability and Acceptance of Attack-De..:
, In:
?
Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning; Lecture Notes in Computer Science ,
5
Formal Analysis of Lending Pools in Decentralized Finance:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
6
Maximizing Extractable Value from Automated Market Makers:
, In:
?
Computational Methods in Systems Biology; Lecture Notes in Computer Science ,
8
Reducing Boolean Networks with Backward Boolean Equivalence:
, In:
?
Computer Aided Verification; Lecture Notes in Computer Science ,
9
Model Checking $$\omega $$-Regular Properties with Decouple..:
, In:
?
12
Formal Methods for Industrial Critical Systems: 26th Intern..
Programming and Software Engineering, 12863
?
Information Security Education. Information Security in Action; IFIP Advances in Information and Communication Technology ,
13
Quality Criteria for Cyber Security MOOCs:
, In:
?
Models, Languages, and Tools for Concurrent and Distributed Programming; Lecture Notes in Computer Science ,
14
A Framework for Provenance-Preserving History Distribution ..:
, In:
?
Lecture Notes in Computer Science; Integrated Formal Methods ,
15