Miroslav Bures, Matej Klima, Vaclav Rechtberger, X. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Bestoun S. Ahmed
{"title":"Interoperability and Integration Testing Methods for IoT Systems: a Systematic Mapping Study","authors":"Miroslav Bures, Matej Klima, Vaclav Rechtberger, X. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Bestoun S. Ahmed","doi":"10.1007/978-3-030-58768-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-58768-0_6","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment","authors":"Dorottya Papp, Thorsten Tarrach, L. Buttyán","doi":"10.1007/978-3-030-30446-1_26","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_26","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126221231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Isabelle/DOF: Design and Implementation","authors":"Achim D. Brucker, B. Wolff","doi":"10.1007/978-3-030-30446-1_15","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_15","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"96 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Foster, Achim D. Brucker, Ramsay G. Taylor, Siobhán North, J. Derrick
{"title":"Incorporating Data into EFSM Inference","authors":"Michael Foster, Achim D. Brucker, Ramsay G. Taylor, Siobhán North, J. Derrick","doi":"10.1007/978-3-030-30446-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_14","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116013609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Minimal DFA: Taking Inspiration from RPNI to Improve SAT Approach","authors":"Florent Avellaneda, A. Petrenko","doi":"10.1007/978-3-030-30446-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_13","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129587840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Farrell, M. Bradbury, Michael Fisher, Louise Dennis, C. Dixon, Hu Yuan, C. Maple
{"title":"Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages","authors":"M. Farrell, M. Bradbury, Michael Fisher, Louise Dennis, C. Dixon, Hu Yuan, C. Maple","doi":"10.1007/978-3-030-30446-1_25","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_25","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122446930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hugo L. S. Araujo, Gustavo Carvalho, M. Mousavi, A. Sampaio
{"title":"Multi-objective Search for Effective Testing of Cyber-Physical Systems","authors":"Hugo L. S. Araujo, Gustavo Carvalho, M. Mousavi, A. Sampaio","doi":"10.1007/978-3-030-30446-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_10","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"1993 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126746853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Formal Model-Based Assurance Cases for Autonomous Robots","authors":"Mario Gleirscher, S. Foster, Yakoub Nemouchi","doi":"10.1007/978-3-030-30446-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_5","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133240319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernhard Beckert, Thorsten Bormer, S. Gocht, Mihai Herda, Daniel Lentzsch, Mattias Ulbrich
{"title":"Using Relational Verification for Program Slicing","authors":"Bernhard Beckert, Thorsten Bormer, S. Gocht, Mihai Herda, Daniel Lentzsch, Mattias Ulbrich","doi":"10.1007/978-3-030-30446-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_19","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124633468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Partially Bounded Context-Aware Verification","authors":"Luka Le Roux, C. Teodorov","doi":"10.1007/978-3-030-30446-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-30446-1_28","url":null,"abstract":"","PeriodicalId":413471,"journal":{"name":"IEEE International Conference on Software Engineering and Formal Methods","volume":"1996 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131136518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}