For the most recent entries see the
Petri Nets Newsletter.
Keyword: security
-
Atluri, Vijay;
Adam, Nabil R.;
Gomaa, Ahmed;
Adiwijaya, Igg:
Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints.
2003.
-
Lim, Shin-Young;
Ko, Jeong-Ho;
Jun, Eun-Ah;
Lee, Gang-Soo:
Specification and analysis of n-way key recovery system by extended cryptographic timed Petri net.
2001.
-
Lima, Shin-Young;
Kob, Jeong-Ho;
Junb, Eun-Ah;
Lee, Gang-Soo:
Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net.
2001.
-
Stehr, Mark-Oliver:
Characterizing Security in Synchronization Graphs.
1999.
-
Petri, Carl Adam;
Yuan, Chong Yi:
On Technical Safety and Security (continued).
1990.
-
Picciolo, G.:
Availability Assessment of Complex Distributed Control System of a Petro Chemical Plant.
1989.
-
Tankoano, J.;
Derniame, J.C.:
Petri Nets and Distributable Applications.
1989.
-
Petri, Carl Adam:
On Technical Safety and Security.
1989.
Do you need a refined search? Try our search engine
which allows complex field-based queries.
Back to the Petri Nets Bibliography