A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Key wordsCybersecurity; Knowledge graph; Knowledge deduction
...
A multi-flow information flow tracking approach for proving quantitative hardware security properties
Key wordshardware security; Information Flow Tracking (IFT);
...