Cited By
View all- Shosha AJames JGladyshev P(2012)A Novel Methodology for Malware Intrusion Attack Path ReconstructionDigital Forensics and Cyber Crime10.1007/978-3-642-35515-8_11(131-140)Online publication date: 2012
Persistence of information is common in modern computer systems. This paper describes how to extend Petri nets, a traditional model of concurrent and distributed computations, to take account of conditions that are persistent. We found use for this kind ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in