Abstract is missing.
- Automated Consistency Analysis for Legal ContractsAlan Khoja, Martin Kölbl, Stefan Leue, Rüdiger Wilhelmi. 1-23 [doi]
- Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-AttacksFereidoun Moradi, Maryam Bagheri 0001, Hanieh Rahmati, Hamed Yazdi, Sara Abbaspour Asadollah, Marjan Sirjani. 24-43 [doi]
- Synthesis of Rigorous Floating-Point PredicatesThanh Son Nguyen, Ben Jones, Zvonimir Rakamaric. 44-60 [doi]
- Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued SignalsShiraj Arora, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen. 61-78 [doi]
- SpecRepair: Counter-Example Guided Safety Repair of Deep Neural NetworksFabian Bauer-Marquart, David Boetius, Stefan Leue, Christian Schilling 0001. 79-96 [doi]
- Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis WorkbenchParker Hanson, Benjamin Winters, Eric Mercer, Brett Decker. 97-113 [doi]
- Bounded-Memory Runtime EnforcementSaumya Shankar, Antoine Rollet, Srinivas Pinisetty, Yliès Falcone. 114-133 [doi]
- Solving String Theories Involving Regular Membership Predicates Using SATMitja Kulczynski, Kevin Lotz, Dirk Nowotka, Danny Bøgsted Poulsen. 134-151 [doi]