Author of the publication

Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages.

, , , , , , and . SEFM, volume 11724 of Lecture Notes in Computer Science, page 471-490. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Synchronisation, Gossip and Environmental Effects for Wireless Sensor Networks., , , , and . ECEASST, (2018)Resolution for Temporal Logics of Knowledge., , and . J. Log. Comput., 8 (3): 345-372 (1998)Temporal Resolution Using a Breadth-First Search Algorithm.. Ann. Math. Artif. Intell., 22 (1-2): 87-115 (1998)Clausal temporal resolution., , and . ACM Trans. Comput. Log., 2 (1): 12-56 (2001)Deductive temporal reasoning with constraints., , , and . J. Appl. Log., 11 (1): 30-51 (2013)Theorem Proving for Pointwise Metric Temporal Logic Over the Naturals via Translations., , and . J. Autom. Reason., 64 (8): 1553-1610 (2020)sf Kn : Architecture, Refinements, Strategies and Experiments., , and . J. Autom. Reason., 64 (3): 461-484 (2020)Buy One Get 14 Free: Evaluating Local Reductions for Modal Logic., , , and . CADE, volume 14132 of Lecture Notes in Computer Science, page 382-400. Springer, (2023)Verifying Autonomous Robots: Challenges and Reflections (Invited Talk).. TIME, volume 178 of LIPIcs, page 1:1-1:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)The Set of Support Strategy in Temporal Resolution., and . TIME, page 113-120. IEEE Computer Society, (1998)