Abstract is missing.
- Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent SystemsJaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, Mariëlle Stoelinga. 3-19 [doi]
- Robustness and Failure Detection in Epistemic Gossip ProtocolsKosei Fujishiro, Koji Hasebe. 20-35 [doi]
- Reasoning with FailuresHamid Jahanian, Annabelle McIver. 36-52 [doi]
- Verification of Programs with Pointers in SPARKGeorges-Axel Jaloyan, Claire Dross, Maroua Maalej, Yannick Moy, Andrei Paskevich. 55-72 [doi]
- Automated Temporal Verification of Integrated Dependent EffectsYahui Song, Wei-Ngan Chin. 73-90 [doi]
- A Reversible Operational Semantics for Imperative Programming LanguagesMaribel Fernández, Ian Mackie. 91-106 [doi]
- Parallel Chopped Symbolic ExecutionShikhar Singh, Sarfraz Khurshid. 107-125 [doi]
- PAC Learning of Deterministic One-Clock Timed AutomataWei Shen, Jie An, Bohua Zhan, Miaomiao Zhang, Bai Xue 0001, Naijun Zhan. 129-146 [doi]
- Learning Fault Models of Cyber Physical SystemsTeck Ping Khoo, Jun Sun 0001, Sudipta Chattopadhyay. 147-162 [doi]
- VARF: Verifying and Analyzing Robustness of Random ForestsChaoqun Nie, Jianqi Shi, Yanhong Huang. 163-178 [doi]
- Type-Based Declassification for FreeMinh Ngo, David A. Naumann, Tamara Rezk. 181-197 [doi]
- Four-Valued Monitorability of ømega-Regular LanguagesZhe Chen, Yunyun Chen, Robert M. Hierons, Yifan Wu. 198-214 [doi]
- Formally Verified Trades in Financial MarketsSuneel Sarswat, Abhishek Kr Singh. 217-232 [doi]
- Formalizing the Transaction Flow Process of Hyperledger FabricXiangyu Chen, Ximeng Li 0003, Qianying Zhang, Zhiping Shi 0001, Yong Guan. 233-250 [doi]
- Embedding Approximation in Event-B: Safe Hybrid System Design Using Proof and RefinementGuillaume Dupont, Yamine Aït Ameur, Neeraj Kumar Singh, Fuyuki Ishikawa, Tsutomu Kobayashi, Marc Pantel. 251-267 [doi]
- Formal Foundations for Intel SGX Data Center Attestation PrimitivesMuhammad Usama Sardar, Rasha Faqeh, Christof Fetzer. 268-283 [doi]
- Towards Modeling and Verification of the CKB Block Synchronization Protocol in CoqHao Bu, Meng Sun. 287-296 [doi]
- Accurate Abstractions for Controller Synthesis with Non-uniform DisturbancesYunjun Bai, Kaushik Mallik. 297-307 [doi]
- Formalising Privacy-Preserving Constraints in Microservices ArchitectureInna Vistbakka, Elena Troubitsyna. 308-317 [doi]
- Algebraic Approach for Confidence Evaluation of Assurance CasesYoriyuki Yamagata, Yutaka Matsuno. 318-327 [doi]