References

  1. Davide Ancona, Luca Franceschini, Angelo Ferrando & Viviana Mascardi (2021): RML: Theory and Practice of a Domain Specific Language for Runtime Verification. Science of Computer Programming 205, pp. 102610, doi:10.1016/j.scico.2021.102610.
  2. Phillip J. Brooke & Richard F. Paige (2003): Fault Trees for Security System Design and Analysis. Computers & Security 22(3), pp. 256–264, doi:10.1016/S0167-4048(03)00313-4.
  3. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe & César Sánchez (2014): Temporal Logics for Hyperproperties. In: Proc. Third International Conference on Principles of Security and Trust (POST), Lecture Notes in Computer Science 8414. Springer, pp. 265–284, doi:10.1007/978-3-642-54792-8_15.
  4. Marie Farrell, Matt Luckcuck, Laura Pullum, Michael Fisher, Ali Hessami, Danit Gal, Zvikomborero Murahwi & Ken Wallace (2021): Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous Systems. In: Proc. 32nd International Symposium on Software Reliability Engineering 2021 - Industry Track, doi:10.1109/ISSREW53611.2021.00109.
  5. Angelo Ferrando, Rafael C. Cardoso, Michael Fisher, Davide Ancona, Luca Franceschini & Viviana Mascardi (2020): ROSMonitoring: A Runtime Verification Framework for ROS. In: Towards Autonomous Robotic Systems. Springer, pp. 387–399, doi:10.1007/978-3-030-63486-5_40.
  6. Michael Fisher, Rafael C. Cardoso, Emily C. Collins, Christopher Dadswell, Louise A. Dennis, Clare Dixon, Marie Farrell, Angelo Ferrando, Xiaowei Huang, Mike Jump, Georgios Kourtis, Alexei Lisitsa, Matt Luckcuck, Shan Luo, Vincent Page, Fabio Papacchini & Matt Webster (2021): An Overview of Verification and Validation Challenges for Inspection Robots. Robotics 10(2), doi:10.3390/robotics10020067.
  7. Ali Kassem & Yliès Falcone (2019): Detecting Fault Injection Attacks with Runtime Verification. In: Proc. 3rd ACM Workshop on Software Protection, SPRO'19. ACM, New York, NY, USA, pp. 65–76, doi:10.1145/3338503.3357724.
  8. Rajesh Kumar & Mariëlle Stoelinga (2017): Quantitative Security and Safety Analysis with Attack-Fault Trees. In: Proc. 18th International Symposium on High Assurance Systems Engineering. IEEE, pp. 25–32, doi:10.1109/HASE.2017.12.
  9. Martin Leucker & Christian Schallhart (2009): A Brief Account of Runtime Verification. Journal of Logic and Algebraic Programming 78(5), pp. 293–303, doi:10.1016/j.jlap.2008.08.004.
  10. Elena Lisova, Irfan Šljivo & Aida Čaušević (2019): Safety and Security Co-Analyses: A Systematic Literature Review. IEEE Systems Journal 13(3), pp. 2189–2200, doi:10.1109/JSYST.2018.2881017.
  11. Patrick Moosbrugger, Kristin Y. Rozier & Johann Schumann (2017): R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. Formal Methods in Systems Design 51(1), pp. 31–61, doi:10.1007/s10703-017-0275-x.
  12. Igor Nai Fovino, Marcelo Masera & Alessio De Cian (2009): Integrating Cyber Attacks within Fault Trees. Reliability Engineering & System Safety 94(9), pp. 1394–1402, doi:10.1016/j.ress.2009.02.020.
  13. Amir Pnueli (1977): The Temporal Logic of Programs. In: Proc. 18th Annual Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society, pp. 46–57, doi:10.1109/SFCS.1977.32.
  14. Giedre Sabaliauskaite & Aditya P. Mathur (2015): Aligning Cyber-Physical System Safety and Security. In: Complex Systems Design & Management Asia. Springer, pp. 41–53, doi:10.1007/978-3-319-12544-2_4.
  15. M. Wooldridge & A. Rao (1999): Foundations of Rational Agency. Applied Logic Series. Kluwer Academic Publishers, doi:10.1007/978-94-015-9204-8.
  16. Thomas Wright, Andrew West, Mauro Licata, Nick Hawes & Barry Lennox (2021): Simulating Ionising Radiation in Gazebo for Robotic Nuclear Inspection Challenges. Robotics 10(3), doi:10.3390/robotics10030086.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org