Abstract is missing.
- Factorization of the State Space Construction for Cyclic Systems with DataJohan Arcile, Raymond R. Devillers, Hanna Klaudel. 1-14 [doi]
- Verified High Performance Computing: The SyDPaCC ApproachFrédéric Loulergue, Ali Ed-Dbali. 15-29 [doi]
- A QoE Driven DRL Approach for Network Slicing Based on SFC Orchestration in SDN/NFV Enabled NetworksWiem Taktak, Mohamed Escheikh, Kamel Barkaoui. 30-44 [doi]
- On Language-Based Opacity Verification Problem in Discrete Event Systems Under Orwellian ObservationSalwa Habbachi, Imene Ben Hafaiedh, Zhiwu Li 0001, Moez Krichen. 45-59 [doi]
- An Enhanced Interface-Based Probabilistic Compositional Verification ApproachSamir Ouchani, Otmane Aït Mohamed, Mourad Debbabi. 60-75 [doi]
- A Sound Abstraction Method Towards Efficient Neural Networks VerificationFateh Boudardara, Abderraouf Boussif, Mohamed Ghazel. 76-89 [doi]
- Towards Formal Verification of Node RED-Based IoT ApplicationsIkram Garfatta, Nour Elhouda Souid, Kaïs Klai. 90-104 [doi]
- Formal Verification of a Post-quantum Signal Protocol with TamarinHugo Beguinet, Céline Chevalier, Thomas Ricosset, Hugo Senet. 105-121 [doi]
- A Comparative Study of Online Cybersecurity Training PlatformsAbdeslam Rehaimi, Yassine Sadqi, Yassine Maleh. 122-134 [doi]
- White-Box Mutation Testing of Smart Contracts: A Quick ReviewAfef Jmal Maâlej, Mariam Lahami. 135-148 [doi]
- Blockchain-Based Trust Management for IoMT EnvironmentMariem Fourati, Amel Meddeb-Makhlouf, Faouzi Zarai. 149-162 [doi]
- Command & Control in UAVs Fleets: Coordinating Drones for Ground Missions in Changing ContextsMoussa Amrani, Abdelkader Ouared, Pierre-Yves Schobbens. 163-177 [doi]