|
||
---|---|---|
hal-02638911v1
Article dans une revue
Formal verification of security pattern composition: application to SCADA COMPUTING AND INFORMATICS, 2019, 38, pp.1149-1180. ⟨10.31577/cai.2019.5.1149⟩ |
||
|