-
Compromised Digital Infrastructures Adaptive Lightweight Encryption with Formal Verification for Secure and Energy-Efficient Internet of Drones Communications Privacy-Preservation Techniques for Securing Large
-
automation, to space and planetary exploration among many others. The research will involve the development of new techniques, comprehensive modelling and software implementation, followed by the construction
Searches related to software verification
Enter an email to receive alerts for software-verification positions