{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T10:38:15Z","timestamp":1751279895267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587925"},{"type":"electronic","value":"9783030587932"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58793-2_32","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"399-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Applied Statistical Model Checking for a Sensor Behavior Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5070-2591","authenticated-orcid":false,"given":"Salim","family":"Chehida","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-7501","authenticated-orcid":false,"given":"Abdelhakim","family":"Baouya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5753-2126","authenticated-orcid":false,"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4412-5684","authenticated-orcid":false,"given":"Marius","family":"Bozga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3158668","volume":"28","author":"G Agha","year":"2018","unstructured":"Agha, G., Palmskog, K.: A survey of statistical model checking. ACM Trans. Modeling Comput. Simul. 28(1), 1\u201339 (2018). https:\/\/doi.org\/10.1145\/3158668","journal-title":"ACM Trans. Modeling Comput. Simul."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"101608","DOI":"10.1016\/j.scs.2019.101608","volume":"49","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman, F., Malekloo, A.: Smart parking in IoT-enabled cities: a survey. Sustain. Cities Soc. 49, 101608 (2019)","journal-title":"Sustain. Cities Soc."},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1006\/inco.1993.1025","volume":"104","author":"R Alur","year":"1993","unstructured":"Alur, R., Henzinger, T.: Real-time logics: complexity and expressiveness. Inf. Comput. 104(1), 35\u201377 (1993). https:\/\/doi.org\/10.1006\/inco.1993.1025","journal-title":"Inf. Comput."},{"issue":"3","key":"32_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., et al.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28(3), 41\u201348 (2011)","journal-title":"IEEE Softw."},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-030-36537-0_5","volume-title":"Graphical Models for Security","author":"D Beaulaton","year":"2019","unstructured":"Beaulaton, D., Said, N.B., Cristescu, I., Sadou, S.: Security analysis of IoT systems using attack trees. In: Albanese, M., Horne, R., Probst, C.W. (eds.) GraMSec 2019. LNCS, vol. 11720, pp. 68\u201394. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36537-0_5"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. ACM SIGMOD Rec. 29(2), 93\u2013104 (2000). https:\/\/doi.org\/10.1145\/335191.335388","journal-title":"ACM SIGMOD Rec."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.procs.2020.03.021","volume":"170","author":"A Daissaoui","year":"2020","unstructured":"Daissaoui, A., Boulmakoul, A., Karim, L., Lbath, A.: IoT and big data analytics for smart buildings: a survey. Procedia Comput. Sci. 170, 161\u2013168 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.021","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"32_CR8","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10009-014-0361-y","volume":"17","author":"A David","year":"2015","unstructured":"David, A., Larsen, K.G., Legay, A., Miku\u010dionis, M., Poulsen, D.B.: Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transf. 17(4), 397\u2013415 (2015)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"32_CR9","doi-asserted-by":"publisher","unstructured":"Dougherty, J., Kohavi, R., Sahami, M.: Supervised and unsupervised discretization of continuous features. In: Prieditis, A., Russell, S. (eds.) Machine Learning Proceedings 1995, pp. 194\u2013202. Morgan Kaufmann, San Francisco (1995). https:\/\/doi.org\/10.1016\/B978-1-55860-377-6.50032-3","DOI":"10.1016\/B978-1-55860-377-6.50032-3"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jss.2016.01.026","volume":"115","author":"JM Franco","year":"2016","unstructured":"Franco, J.M., Correia, F., Barbosa, R., Zenha-Rela, M., Schmerl, B., Garlan, D.: Improving self-adaptation planning through software architecture-based stochastic modeling. J. Syst. Softw. 115, 42\u201360 (2016). https:\/\/doi.org\/10.1016\/j.jss.2016.01.026","journal-title":"J. Syst. Softw."},{"key":"32_CR11","unstructured":"Giannoni, F., Mancini, M., Marinelli, F.: Anomaly Detection Models for IoT Time Series Data. ArXiv abs\/1812.00890 (2018)"},{"issue":"9\u201310","key":"32_CR12","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., Deng, S.: Discovering cluster-based local outliers. Pattern Recogn. Lett. 24(9\u201310), 1641\u20131650 (2003). https:\/\/doi.org\/10.1016\/S0167-8655(03)00003-5","journal-title":"Pattern Recogn. Lett."},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-24622-0_8","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"T H\u00e9rault","year":"2004","unstructured":"H\u00e9rault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate probabilistic model checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 73\u201384. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_8"},{"key":"32_CR14","doi-asserted-by":"publisher","unstructured":"Hill, D.J., Minsker, B.S., Amir, E.: Real-time Bayesian anomaly detection in streaming environmental data: REAL-TIME BAYESIAN ANOMALY DETECTION. Water Resources Res. 45(4) (2009). https:\/\/doi.org\/10.1029\/2008WR006956","DOI":"10.1029\/2008WR006956"},{"key":"32_CR15","doi-asserted-by":"publisher","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Prism 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) Computer Aided Verification, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"32_CR16","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: ESANN (2015)"},{"key":"32_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-030-01090-4_33","volume-title":"Automated Technology for Verification and Analysis","author":"BL Mediouni","year":"2018","unstructured":"Mediouni, B.L., Nouri, A., Bozga, M., Dellabani, M., Legay, A., Bensalem, S.: $$\\cal{S}$$BIP 2.0: statistical model checking stochastic real-time systems. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 536\u2013542. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_33"},{"key":"32_CR18","doi-asserted-by":"publisher","unstructured":"Mercaldo, F., Martinelli, F., Santone, A.: Real-Time SCADA attack detection by means of formal methods. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 231\u2013236. IEEE, Napoli, Italy, June 2019. https:\/\/doi.org\/10.1109\/WETICE.2019.00057","DOI":"10.1109\/WETICE.2019.00057"},{"issue":"5","key":"32_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCC.2016.108","volume":"3","author":"A Naskos","year":"2016","unstructured":"Naskos, A., Gounaris, A., Mouratidis, H., Katsaros, P.: Online analysis of security risks in elastic cloud applications. IEEE Cloud Comput. 3(5), 26\u201333 (2016). https:\/\/doi.org\/10.1109\/MCC.2016.108","journal-title":"IEEE Cloud Comput."},{"issue":"2","key":"32_CR20","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10009-014-0313-6","volume":"17","author":"A Nouri","year":"2014","unstructured":"Nouri, A., Bensalem, S., Bozga, M., Delahaye, B., Jegourel, C., Legay, A.: Statistical model checking QoS properties of systems with SBIP. Int. J. Softw. Tools Technol. Transf. 17(2), 171\u2013185 (2014). https:\/\/doi.org\/10.1007\/s10009-014-0313-6","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"3\/4","key":"32_CR21","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1504\/IJCCBS.2018.096439","volume":"8","author":"A Nouri","year":"2018","unstructured":"Nouri, A., Mediouni, B.L., Bozga, M., Combaz, J., Bensalem, S., Legay, A.: Performance evaluation of stochastic real-time systems with the SBIP framework. Int. J. Critical Comput.-Based Syst. 8(3\/4), 340 (2018)","journal-title":"Int. J. Critical Comput.-Based Syst."},{"issue":"8","key":"32_CR22","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.1016\/j.tele.2018.10.005","volume":"35","author":"C Park","year":"2018","unstructured":"Park, C., Kim, Y., Jeong, M.: Influencing factors on risk perception of IoT-based home energy management services. Telematics Inform. 35(8), 2355\u20132365 (2018)","journal-title":"Telematics Inform."},{"key":"32_CR23","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE Computer Society, USA, October 1977. https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"issue":"4","key":"32_CR24","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1109\/TASE.2015.2471842","volume":"12","author":"J Saives","year":"2015","unstructured":"Saives, J., Pianon, C., Faraut, G.: Activity discovery and detection of behavioral deviations of an inhabitant from binary sensors. IEEE Trans. Autom. Sci. Eng. 12(4), 1211\u20131224 (2015). https:\/\/doi.org\/10.1109\/TASE.2015.2471842","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"4","key":"32_CR25","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s10462-013-9395-x","volume":"43","author":"N Shahid","year":"2013","unstructured":"Shahid, N., Naqvi, I.H., Qaisar, S.B.: One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments. Artif. Intell. Rev. 43(4), 515\u2013563 (2013). https:\/\/doi.org\/10.1007\/s10462-013-9395-x","journal-title":"Artif. Intell. Rev."},{"key":"32_CR26","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.comcom.2019.12.006","volume":"150","author":"Z Tao","year":"2020","unstructured":"Tao, Z.: Advanced Wavelet Sampling algorithm for IoT based environmental monitoring and management. Comput. Commun. 150, 547\u2013555 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2019.12.006","journal-title":"Comput. Commun."},{"key":"32_CR27","doi-asserted-by":"publisher","unstructured":"Yang, Y., Webb, G.I., Wu, X.: Discretization methods. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 101\u2013116. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-09823-4_6","DOI":"10.1007\/978-0-387-09823-4_6"},{"issue":"1","key":"32_CR28","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., Shun-Zheng, Y.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Trans. Network. 17(1), 54\u201365 (2009). https:\/\/doi.org\/10.1109\/TNET.2008.923716","journal-title":"IEEE\/ACM Trans. Network."},{"key":"32_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45657-0_17","volume-title":"Computer Aided Verification","author":"HLS Younes","year":"2002","unstructured":"Younes, H.L.S., Simmons, R.G.: Probabilistic verification of discrete event systems using acceptance sampling. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 223\u2013235. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45657-0_17"},{"key":"32_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/879736","volume":"2014","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Zhu, Y., Li, S., Wan, D.: Time series outlier detection based on sliding window prediction. Math. Probl. Eng. 2014, 1\u201314 (2014). https:\/\/doi.org\/10.1155\/2014\/879736","journal-title":"Math. Probl. Eng."}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58793-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:31:16Z","timestamp":1619224276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58793-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587925","9783030587932"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58793-2_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}