{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T08:46:15Z","timestamp":1743497175216,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031626449"},{"type":"electronic","value":"9783031626456"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62645-6_13","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:01:51Z","timestamp":1718168511000},"page":"230-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Guess and\u00a0Then Check: Controller Synthesis for\u00a0Safe and\u00a0Secure Cyber-Physical Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0570-6005","authenticated-orcid":false,"given":"Rong","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5495-9098","authenticated-orcid":false,"given":"Zahra","family":"Moezkarimi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5478-0987","authenticated-orcid":false,"given":"Marjan","family":"Sirjani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"issue":"18","key":"13_CR1","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S1474-6670(17)42032-5","volume":"31","author":"E Asarin","year":"1998","unstructured":"Asarin, E., Maler, O., Pnueli, A., Sifakis, J.: Controller synthesis for timed automata. IFAC Proc. Volumes 31(18), 447\u2013452 (1998)","journal-title":"IFAC Proc. Volumes"},{"key":"13_CR2","unstructured":"Baier, C., Katoen, J.P.: Principles of model checking. MIT press (2008)"},{"key":"13_CR3","unstructured":"BBC: Uber\u2019s self-driving operator charged over fatal crash. https:\/\/www.bbc.com\/news\/technology-54175359 (September 16th, 2020)"},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.jcss.2011.08.007","volume":"78","author":"R Bloem","year":"2012","unstructured":"Bloem, R., Jobstmann, B., Piterman, N., Pnueli, A., Sa\u00e1r, Y.: Synthesis of reactive (1) designs. J. Comput. Syst. Sci. 78(3), 911\u2013938 (2012)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/comjnl\/35.1.3","volume":"35","author":"A Burns","year":"1992","unstructured":"Burns, A., McDermid, J., Dobson, J.: On the meaning of safety and security. Comput. J. 35(1), 3\u201315 (1992). https:\/\/doi.org\/10.1093\/comjnl\/35.1.3","journal-title":"Comput. J."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/11539452_9","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"F Cassez","year":"2005","unstructured":"Cassez, F., David, A., Fleury, E., Larsen, K.G., Lime, D.: Efficient on-the-fly algorithms for the analysis of timed games. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005 \u2013 Concurrency Theory, pp. 66\u201380. Springer Berlin Heidelberg, Berlin, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11539452_9"},{"key":"13_CR7","unstructured":"Church, A.: Application of recursive arithmetic to the problem of circuit synthesis. J. Symbolic Logic 28(4) (1963)"},{"issue":"6","key":"13_CR8","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"MR Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157\u20131210 (2010)","journal-title":"J. Comput. Secur."},{"key":"13_CR9","unstructured":"Group, R.R.: Rebeca (2017). https:\/\/rebeca-lang.org\/"},{"key":"13_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2022.102894","volume":"224","author":"R Gu","year":"2022","unstructured":"Gu, R., Jensen, P.G., Seceleanu, C., Enoiu, E., Lundqvist, K.: Correctness-guaranteed strategy synthesis and compression for multi-agent autonomous systems. Sci. Comput. Program. 224, 102894 (2022)","journal-title":"Sci. Comput. Program."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-031-37706-8_20","volume-title":"Computer Aided Verification: 35th International Conference, CAV 2023, Paris, France, July 17\u201322, 2023, Proceedings, Part I","author":"J K\u0159et\u00ednsk\u00fd","year":"2023","unstructured":"K\u0159et\u00ednsk\u00fd, J., Meggendorfer, T., Prokop, M., Rieder, S.: Guessing winning policies in\u00a0LTL synthesis by\u00a0semantic learning. In: Enea, C., Lal, A. (eds.) Computer Aided Verification: 35th International Conference, CAV 2023, Paris, France, July 17\u201322, 2023, Proceedings, Part I, pp. 390\u2013414. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-37706-8_20"},{"issue":"5","key":"13_CR12","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1137\/0319039","volume":"19","author":"PR Kumar","year":"1981","unstructured":"Kumar, P.R., Shiau, T.H.: Existence of value and randomized strategies in zero-sum discrete-time stochastic dynamic games. SIAM J. Control. Optim. 19(5), 617\u2013634 (1981)","journal-title":"SIAM J. Control. Optim."},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-031-22337-2_19","volume-title":"Principles of Systems Design: Essays Dedicated to Thomas A. Henzinger on the Occasion of His 60th Birthday","author":"M Kwiatkowska","year":"2022","unstructured":"Kwiatkowska, M., Norman, G., Parker, D., Santos, G.: Symbolic verification and strategy synthesis for turn-based stochastic games. In: Raskin, J.-F., Chatterjee, K., Doyen, L., Majumdar, R. (eds.) Principles of Systems Design: Essays Dedicated to Thomas A. Henzinger on the Occasion of His 60th Birthday, pp. 388\u2013406. Springer Nature Switzerland, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22337-2_19"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.arcontrol.2022.03.004","volume":"53","author":"S Liu","year":"2022","unstructured":"Liu, S., Trivedi, A., Yin, X., Zamani, M.: Secure-by-construction synthesis of cyber-physical systems. Annu. Rev. Control. 53, 30\u201350 (2022)","journal-title":"Annu. Rev. Control."},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-43835-6_1","volume-title":"Quantitative Evaluation of Systems: 20th International Conference, QEST 2023, Antwerp, Belgium, September 20\u201322, 2023, Proceedings","author":"D Parker","year":"2023","unstructured":"Parker, D.: Multi-agent verification and\u00a0control with\u00a0probabilistic model checking. In: Jansen, N., Tribastone, M. (eds.) Quantitative Evaluation of Systems: 20th International Conference, QEST 2023, Antwerp, Belgium, September 20\u201322, 2023, Proceedings, pp. 1\u20139. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-43835-6_1"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1007\/BFb0035790","volume-title":"Automata, Languages and Programming","author":"A Pnueli","year":"1989","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of an asynchronous reactive module. In: Ausiello, G., Dezani-Ciancaglini, M., Della Rocca, S.R. (eds.) Automata, Languages and Programming, pp. 652\u2013671. Springer Berlin Heidelberg, Berlin, Heidelberg (1989). https:\/\/doi.org\/10.1007\/BFb0035790"},{"key":"13_CR17","unstructured":"Post, T.W.: 17 fatalities, 736 crashes: The shocking toll of tesla\u2019s autopilot (2023). https:\/\/www.washingtonpost.com\/technology\/2023\/06\/10\/tesla-autopilot-crashes-elon-musk\/"},{"key":"13_CR18","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement learning: An introduction. MIT press (2018)"},{"key":"13_CR19","unstructured":"Wired: Hackers remotely kill a jeep on the highway-with me in it (2015). https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62645-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:03:31Z","timestamp":1718168611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62645-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031626449","9783031626456"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62645-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}