Coping with outside-the-box attacks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish (US)
Title of host publicationComputer Aided Verification - 20th International Conference, CAV 2008, Proceedings
Pages3-4
Number of pages2
DOIs
StatePublished - Aug 13 2008
Event20th International Conference on Computer Aided Verification, CAV 2008 - Princeton, NJ, United States
Duration: Jul 7 2008Jul 14 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5123 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other20th International Conference on Computer Aided Verification, CAV 2008
CountryUnited States
CityPrinceton, NJ
Period7/7/087/14/08

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Coping with outside-the-box attacks'. Together they form a unique fingerprint.

  • Cite this

    Felten, E. W. (2008). Coping with outside-the-box attacks. In Computer Aided Verification - 20th International Conference, CAV 2008, Proceedings (pp. 3-4). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5123 LNCS). https://doi.org/10.1007/978-3-540-70545-1_2