{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:38:15Z","timestamp":1766428695051,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031659409"},{"type":"electronic","value":"9783031659416"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65941-6_2","type":"book-chapter","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T07:10:56Z","timestamp":1722496256000},"page":"22-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Time-Bounded Resilience"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3230-6891","authenticated-orcid":false,"given":"Tajana","family":"Ban Kirigin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9734-3457","authenticated-orcid":false,"given":"Jesse","family":"Comer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7502-1653","authenticated-orcid":false,"given":"Max","family":"Kanovich","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4536-0419","authenticated-orcid":false,"given":"Andre","family":"Scedrov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2845-7144","authenticated-orcid":false,"given":"Carolyn","family":"Talcott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Alturki, M.A., Ban Kirigin, T., Kanovich, M., Nigam, V., Scedrov, A., Talcott, C.: On the formalization and computational complexity of resilience problems for cyber-physical systems. In: Theoretical Aspects of Computing\u2013ICTAC 2022: 19th International Colloquium, Tbilisi, Georgia, September 27\u201329, 2022, Proceedings, pp. 96\u2013113. Springer, Berlin (2022)","DOI":"10.1007\/978-3-031-17715-6_8"},{"key":"2_CR2","unstructured":"Arora, S., Barak, B.: Complexity Theory: A Modern Approach. Cambridge University Press Cambridge (2009)"},{"key":"2_CR3","unstructured":"Ban Kirigin, T., Comer, J., Kanovich, M., Scedrov, A., Talcott, C.: Technical report: Time-bounded resilience (2024). arXiv:2401.05585"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Banescu, S., Ochoa, M., Pretschner, A.: A framework for measuring software obfuscation resilience against automated attacks. In: 2015 IEEE\/ACM 1st International Workshop on Software Protection, pp. 45\u201351 (2015)","DOI":"10.1109\/SPRO.2015.16"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bauer, E.: Design for Reliability: Information and Computer-Based Systems. Wiley, New York (2011)","DOI":"10.1002\/9781118075104"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bennaceur, A., Ghezzi, C., Tei, K., Kehrer, T., Weyns, D., Calinescu, R., Dustdar, S., Hu, Z., Honiden, S., Ishikawa, F., Jin, Z., Kramer, J., Litoiu, M., Loreti, M., Moreno, G., M\u00fcller, H., Nenzi, L., Nuseibeh, B., Pasquale, L., Reisig, W., Schmidt, H., Tsigkanos, C., Zhao, H.: Modelling and analysing resilient cyber-physical systems. In: 2019 IEEE\/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 70\u201376 (2019)","DOI":"10.1109\/SEAMS.2019.00018"},{"key":"2_CR7","unstructured":"Bloomfield, R., Fletcher, G., Khlaaf, H., Ryan, P., Kinoshita, S., Kinoshit, Y., Takeyama, M., Matsubara, Y., Popov, P., Imai, K., et\u00a0al.: Towards identifying and closing gaps in assurance of autonomous road vehicles\u2013a collection of technical notes part 1 (2020). arXiv:2003.00789"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bozza, A., Asprone, D., Fabbrocino, F.: Urban resilience: A civil engineering perspective. Sustainability 9(1) (2017)","DOI":"10.3390\/su9010103"},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1193\/1.1623497","volume":"19","author":"M Bruneau","year":"2003","unstructured":"Bruneau, M., Chang, S.E., Eguchi, R.T., Lee, G.C., O\u2019Rourke, T.D., Reinhorn, A.M., Shinozuka, M., Tierney, K., Wallace, W.A., Von Winterfeldt, D.: A framework to quantitatively assess and enhance the seismic resilience of communities. Earthq. Spectra 19(4), 733\u2013752 (2003)","journal-title":"Earthq. Spectra"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Caminiti, S., Finocchi, I., Fusco, E.G., Silvestri, F.: Resilient dynamic programming. Algorithmica 77(2), 389\u2013425 (2017)","DOI":"10.1007\/s00453-015-0073-z"},{"key":"2_CR11","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.: All About Maude: A High-Performance Logical Framework, volume 4350 of LNCS. Springer, Berlin (2007)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Cunningham, D., Grove, D., Herta, B., Iyengar, A., Kawachiya, K., Murata, H., Saraswat, V., Takeuchi, M., Tardieu, O.: Resilient x10: Efficient failure-aware programming. SIGPLAN Not. 49(8), 67\u201380 (2014)","DOI":"10.1145\/2692916.2555248"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3233\/JCS-2004-12203","volume":"12","author":"NA Durgin","year":"2004","unstructured":"Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur. 12(2), 247\u2013311 (2004)","journal-title":"J. Comput. Secur."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L.D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., Mercaldo, F.: Towards resilient artificial intelligence: Survey and research issues. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 536\u2013542 (2021)","DOI":"10.1109\/CSR51186.2021.9527986"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Ferraro-Petrillo, U., Finocchi, I., Italiano, G.F.: Experimental study of resilient algorithms and data structures. In: Festa, P., (ed.) Experimental Algorithms, pp. 1\u201312. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13193-6_1"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Folke, C.: Resilience: the emergence of a perspective for social-ecological systems analyses. Global Environ. Change 16(3):253\u2013267 (2006). Resilience, Vulnerability, and Adaptation: A Cross-Cutting Theme of the International Human Dimensions Programme on Global Environmental Change","DOI":"10.1016\/j.gloenvcha.2006.04.002"},{"key":"2_CR17","unstructured":"Goel, S., Hanneke, S., Moran, S., Shetty, A.: Adversarial resilience in sequential prediction via abstention. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"issue":"1","key":"2_CR18","first-page":"1","volume":"62","author":"Y Hirshfeld","year":"2004","unstructured":"Hirshfeld, Y., Rabinovich, A.: Logics for real time: decidability and complexity. Fund. Inform. 62(1), 1\u201328 (2004)","journal-title":"Fund. Inform."},{"key":"2_CR19","unstructured":"Huang, W., Zhou, Y., Sun, Y., Banks, A., Meng, J., Sharp, J., Maskell, S., Huang, X.: Formal verification of robustness and resilience of learning-enabled state estimation systems for robotics (2020)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Hukerikar, S., Diniz, P.C., Lucas, R.F.: A programming model for resilience in extreme scale computing. In: IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), pp. 1\u20136 (2012)","DOI":"10.1109\/DSNW.2012.6264671"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Kanovich, M., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.: Timed multiset rewriting and the verification of time-sensitive distributed systems. In: 14th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS) (2016)","DOI":"10.1007\/978-3-319-44878-7_14"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Kanovich, M., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.: On the complexity of verification of time-sensitive distributed systems. In: Dougherty, D., Meseguer, J., M\u00f6dersheim, S.A., Rowe, P., (eds.), Protocols, Strands, and Logic, volume 13066 of Springer LNCS, pp. 251\u2013275. Springer International Publishing (2021)","DOI":"10.1007\/978-3-030-91631-2_14"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kanovich, M., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L.: Time, computational complexity, and probability in the analysis of distance-bounding protocols. J. Comput. Secur. 25(6), 585\u2013630 (2017)","DOI":"10.3233\/JCS-0560"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Kanovich, M., Ban Kirigin, T., Nigam, V., Scedrov, A., Talcott, C.L., Perovic, R.: A rewriting framework and logic for activities subject to regulations. Math. Struct. Comput. Sci. 27(3), 332\u2013375 (2017)","DOI":"10.1017\/S096012951500016X"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Koren, I., Krishna, C.M.: Fault-Tolerant Systems. Morgan Kaufmann (2020)","DOI":"10.1016\/B978-0-12-818105-8.00014-0"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/JPROC.2017.2731741","volume":"106","author":"X Koutsoukos","year":"2018","unstructured":"Koutsoukos, X., Karsai, G., Laszka, A., Neema, H., Potteiger, B., Volgyesi, P., Vorobeychik, Y., Sztipanovits, J.: Sure: a modeling and simulation integration platform for evaluation of secure and resilient cyber-physical systems. Proc. IEEE 106(1), 93\u2013112 (2018)","journal-title":"Proc. IEEE"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Madni, A.M., Erwin, D., Sievers, M.: Constructing models for systems resilience: challenges, concepts, and formal methods. Systems 8(1) (2020)","DOI":"10.3390\/systems8010003"},{"issue":"2","key":"2_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/JSYST.2009.2017397","volume":"3","author":"AM Madni","year":"2009","unstructured":"Madni, A.M., Jackson, S.: Towards a conceptual framework for resilience engineering. IEEE Syst. J. 3(2), 181\u2013191 (2009)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"2_CR29","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1111\/j.0361-3666.2006.00331.x","volume":"30","author":"SB Manyena","year":"2006","unstructured":"Manyena, S.B.: The concept of resilience revisited. Disasters 30(4), 434\u2013450 (2006)","journal-title":"Disasters"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"33741","DOI":"10.1109\/ACCESS.2019.2903153","volume":"7","author":"S Mouelhi","year":"2019","unstructured":"Mouelhi, S., Laarouchi, M.-E., Cancila, D., Chaouchi, H.: Predictive formal analysis of resilience in cyber-physical systems. IEEE Access 7, 33741\u201333758 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"2_CR31","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3233\/JCS-2006-14203","volume":"14","author":"AC Myers","year":"2006","unstructured":"Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification and qualified robustness. J. Comput. Secur. 14(2), 157\u2013196 (2006)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"2_CR32","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1002\/sys.21234","volume":"16","author":"R Neches","year":"2013","unstructured":"Neches, R., Madni, A.M.: Towards affordably adaptable and effective systems. Syst. Eng. 16(2), 224\u2013234 (2013)","journal-title":"Syst. Eng."},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Nigam, V., Talcott, C.L.: Automating recoverability proofs for cyber-physical systems with runtime assurance architectures. In: David, C., Sun, M., (eds.) 17th International Symposium on Theoretical Aspects of Software Engineering, volume 13931 of Lecture Notes in Computer Science, pp. 1\u201319. Springer, Berlin (2023)","DOI":"10.1007\/978-3-031-35257-7_1"},{"issue":"1","key":"2_CR34","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","volume":"23","author":"FO Olowononi","year":"2021","unstructured":"Olowononi, F.O., Rawat, D.B., Liu, C.: Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for cps. IEEE Commun. Surv. Tutorials 23(1), 524\u2013552 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2_CR35","unstructured":"Papadimitriou, C.H.: Computational Complexity. Academic Internet Publication (2007)"},{"key":"2_CR36","unstructured":"Prasad, A.: Towards Robust and Resilient Machine Learning. Ph.D. thesis, Carnegie Mellon University (2022)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Sharma, V.C., Haran, A., Rakamaric, Z., Gopalakrishnan, G.: Towards formal approaches to system resilience. In: 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, pp. 41\u201350 (2013)","DOI":"10.1109\/PRDC.2013.14"},{"issue":"1","key":"2_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0304-3975(76)90061-X","volume":"3","author":"LJ Stockmeyer","year":"1976","unstructured":"Stockmeyer, L.J.: The polynomial-time hierarchy. Theor. Comput. Sci. 3(1), 1\u201322 (1976)","journal-title":"Theor. Comput. Sci."},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Vardi, M.: Efficiency versus resilience: What covid-19 teaches computing. Commun. ACM 63(5), 9 (2020)","DOI":"10.1145\/3388890"},{"key":"2_CR40","unstructured":"Zdancewic, S., Myers, A.C.: Robust declassification. In: Proceedings of the 14th IEEE Workshop on Computer Security Foundations, CSFW \u201901, p.\u00a05. IEEE Computer Society, USA (2001)"}],"container-title":["Lecture Notes in Computer Science","Rewriting Logic and Its Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65941-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T07:11:58Z","timestamp":1722496318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65941-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031659409","9783031659416"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65941-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WRLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Rewriting Logic and its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wrla2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wrla2024.gitlab.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}