{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:07:07Z","timestamp":1743012427843,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031754333"},{"type":"electronic","value":"9783031754340"}],"license":[{"start":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T00:00:00Z","timestamp":1735516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T00:00:00Z","timestamp":1735516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75434-0_16","type":"book-chapter","created":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T09:24:28Z","timestamp":1735464268000},"page":"225-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Runtime Verification and\u00a0AI: Addressing Pragmatic Regulatory Challenges"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2844-5728","authenticated-orcid":false,"given":"Christian","family":"Colombo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0743-6272","authenticated-orcid":false,"given":"Gordon","family":"Pace","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2377-9833","authenticated-orcid":false,"given":"Dylan","family":"Seychell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,30]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Alshiekh, M., Bloem, R., Ehlers, R., K\u00f6nighofer, B., Niekum, S., Topcu, U.: Safe reinforcement learning via shielding. In: McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, 2\u20137 February 2018, pp. 2669\u20132678. AAAI Press (2018). https:\/\/doi.org\/10.1609\/AAAI.V32I1.11797","DOI":"10.1609\/AAAI.V32I1.11797"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Azzopardi, S., Colombo, C., Ebejer, J., Mallia, E., Pace, G.J.: Runtime verification using VALOUR. In: Reger, G., Havelund, K. (eds.) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, 15 September 2017, Seattle, WA, USA. Kalpa Publications in Computing, vol.\u00a03, pp. 10\u201318. EasyChair (2017). https:\/\/doi.org\/10.29007\/BWD4","DOI":"10.29007\/BWD4"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Azzopardi, S., Colombo, C., Pace, G.J.: A controlled natural language for financial services compliance checking. In: Davis, B., Keet, C.M., Wyner, A. (eds.) Controlled Natural Language - Proceedings of the Sixth International Workshop, CNL 2018, Maynooth, Co. Kildare, Ireland, 27\u201328 August 2018. Front. Artif. Intell. Appl.\u00a0304, 11\u201320. IOS Press (2018). https:\/\/doi.org\/10.3233\/978-1-61499-904-1-11","DOI":"10.3233\/978-1-61499-904-1-11"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Cheng, C., N\u00fchrenberg, G., Yasuoka, H.: Runtime monitoring neuron activation patterns. In: Teich, J., Fummi, F. (eds.) Design, Automation and Test in Europe Conference and Exhibition, DATE 2019, Florence, Italy, 25\u201329 March 2019, pp. 300\u2013303. IEEE (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8714971","DOI":"10.23919\/DATE.2019.8714971"},{"issue":"2","key":"16_CR5","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s12027-020-00617-7","volume":"21","author":"J Ellul","year":"2020","unstructured":"Ellul, J., Galea, J., Ganado, M., Mccarthy, S., Pace, G.J.: Regulating blockchain, DLT and smart contracts: a technology regulator\u2019s perspective. ERA Forum 21(2), 209\u2013220 (2020). https:\/\/doi.org\/10.1007\/s12027-020-00617-7","journal-title":"ERA Forum"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Ellul, J., Pace, G.J., McCarthy, S., Sammut, T., Brockdorff, J., Scerri, M.: Regulating artificial intelligence: a technology regulator\u2019s perspective. In: Maranh\u00e3o, J., Wyner, A.Z. (eds.) ICAIL \u201921: Eighteenth International Conference for Artificial Intelligence and Law, S\u00e3o Paulo Brazil, 21\u201325 June 2021, pp. 190\u2013194. ACM (2021). https:\/\/doi.org\/10.1145\/3462757.3466093","DOI":"10.1145\/3462757.3466093"},{"key":"16_CR7","unstructured":"European Union: Regulation (EU) 2019\/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) (2019)"},{"key":"16_CR8","unstructured":"European Union: Proposal for a Regulation of the European Parliament and of the Council laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) and amending certain Union legislative acts (2024)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-030-58768-0_13","volume-title":"Software Engineering and Formal Methods","author":"A Aranda Garc\u00eda","year":"2020","unstructured":"Aranda Garc\u00eda, A., Cambronero, M.-E., Colombo, C., Llana, L., Pace, G.J.: Runtime verification of contracts with Themulus. In: de Boer, F., Cerone, A. (eds.) SEFM 2020. LNCS, vol. 12310, pp. 231\u2013246. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58768-0_13"},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Pace, G.J., Ellul, J., Revolidis, I., Schneider, G.: When is good enough good enough? On software assurances. ERA Forum 23, 337\u2013360 (2023). https:\/\/doi.org\/10.1007\/s12027-022-00728-3","DOI":"10.1007\/s12027-022-00728-3"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-34026-0_22","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change","author":"K Havelund","year":"2012","unstructured":"Havelund, K.: What does AI have to do with RV? - (extended abstract). In: Margaria, T., Steffen, B. (eds.) ISoLA 2012. LNCS, vol. 7609, pp. 292\u2013294. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34026-0_22"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"He, Y., Schumann, J., Yu, H.: Toward runtime assurance of complex systems with AI components. In: PHM Society European Conference, vol.\u00a07, pp. 166\u2013174. PHM Society (2022). https:\/\/doi.org\/10.36001\/phme.2022.v7i1.3361","DOI":"10.36001\/phme.2022.v7i1.3361"},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Henzinger, T.A., Lukina, A., Schilling, C.: Outside the box: abstraction-based monitoring of neural networks. In: Giacomo, G.D., et al. (eds.) ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August\u20138 September 2020, Santiago de Compostela, Spain - Including 10th Conference on Prestigious Applications of Artificial Intelligence (PAIS 2020). Front. Artif. Intell. Appl.\u00a0325, 2433\u20132440. IOS Press (2020). https:\/\/doi.org\/10.3233\/FAIA200375","DOI":"10.3233\/FAIA200375"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1007\/978-3-031-22337-2_31","volume-title":"Principles of Systems Design","author":"B K\u00f6nighofer","year":"2022","unstructured":"K\u00f6nighofer, B., Bloem, R., Ehlers, R., Pek, C.: Correct-by-construction runtime enforcement in AI - a survey. In: Raskin, J.F., Chatterjee, K., Doyen, L., Majumdar, R. (eds.) Principles of Systems Design. LNCS, vol. 13660, pp. 650\u2013663. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22337-2_31"},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"Lu, S., Lysecky, R.: Time and sequence integrated runtime anomaly detection for embedded systems. ACM Trans. Embed. Comput. Syst. 17(2), 38:1\u201338:27 (2018). https:\/\/doi.org\/10.1145\/3122785","DOI":"10.1145\/3122785"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-030-88494-9_3","volume-title":"Runtime Verification","author":"A Lukina","year":"2021","unstructured":"Lukina, A., Schilling, C., Henzinger, T.A.: Into the unknown: active monitoring of\u00a0neural networks. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 42\u201361. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_3"},{"key":"16_CR17","doi-asserted-by":"publisher","unstructured":"Mallozzi, P., Castellano, E., Pelliccione, P., Schneider, G., Tei, K.: A runtime monitoring framework to enforce invariants on reinforcement learning agents exploring complex environments. In: Proceedings of the 2nd International Workshop on Robotics Software Engineering, RoSE@ICSE 2019, Montreal, QC, Canada, 27 May 2019, pp. 5\u201312. IEEE\/ACM (2019). https:\/\/doi.org\/10.1109\/ROSE.2019.00011","DOI":"10.1109\/ROSE.2019.00011"},{"key":"16_CR18","unstructured":"of\u00a0Malta, G.: Innovative Technology Arrangements and Services Act (2018)"},{"key":"16_CR19","unstructured":"Malta Digital Innovation Authority: AI ITA Blueprint Guidelines (2019). https:\/\/www.mdia.gov.mt\/wp-content\/uploads\/2022\/11\/AI-ITA-Blueprint-Guidelines-03OCT19.pdf"},{"key":"16_CR20","unstructured":"Malta Digital Innovation Authority: AI ITA Guidelines (2019). https:\/\/www.mdia.gov.mt\/wp-content\/uploads\/2022\/11\/AI-ITA-Guidelines-03OCT19.pdf"},{"key":"16_CR21","unstructured":"Malta Digital Innovation Authority: AI ITA Nomenclature (2019). https:\/\/www.mdia.gov.mt\/wp-content\/uploads\/2022\/11\/AI-ITA-Nomenclature-03OCT19.pdf"},{"key":"16_CR22","unstructured":"Malta Digital Innovation Authority: AI System Auditor Control Objectives (2019). https:\/\/www.mdia.gov.mt\/wp-content\/uploads\/2022\/11\/AI-ITA-SA-Control-Objectives-03OCT19.pdf"},{"key":"16_CR23","unstructured":"Malta Digital Innovation Authority: Technology Assurance Sandbox v2.0 Programme Guidelines (2020). https:\/\/www.mdia.gov.mt\/wp-content\/uploads\/2022\/11\/MDIA-Technology-Assurance-Sandbox-TAS-Programme-Guidelines.pdf"},{"key":"16_CR24","doi-asserted-by":"publisher","unstructured":"Neufeld, E.A., Bartocci, E., Ciabattoni, A., Governatori, G.: Enforcing ethical goals over reinforcement-learning policies. Ethics Inf. Technol. 24(4), 43 (2022). https:\/\/doi.org\/10.1007\/S10676-022-09665-8","DOI":"10.1007\/S10676-022-09665-8"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Pace, G.J., Ravn, A.P. (eds.): Proceedings Sixth Workshop on Formal Languages and Analysis of Contract-Oriented Software, FLACOS 2012, Bertinoro, Italy, 19 September 2012, EPTCS, vol.\u00a094 (2012). https:\/\/doi.org\/10.4204\/EPTCS.94","DOI":"10.4204\/EPTCS.94"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-61467-6_1","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Applications","author":"GJ Pace","year":"2020","unstructured":"Pace, G.J., S\u00e1nchez, C., Schneider, G.: Reliable smart contracts. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020, Part III. LNCS, vol. 12478, pp. 3\u20138. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61467-6_1"},{"key":"16_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-46982-9_18","volume-title":"Runtime Verification","author":"R Pardo","year":"2016","unstructured":"Pardo, R., Colombo, C., Pace, G.J., Schneider, G.: An automata-based approach to evolving privacy policies for social networks. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 285\u2013301. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_18"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Pisani, D., Seychell, D., Schembri, M.: Detecting litter from aerial imagery using the SODA dataset. In: 2024 IEEE 22nd Mediterranean Electrotechnical Conference (MELECON) (2024)","DOI":"10.1109\/MELECON56669.2024.10608507"},{"key":"16_CR29","doi-asserted-by":"publisher","unstructured":"Rahman, Q.M., Corke, P., Dayoub, F.: Run-time monitoring of machine learning for robotic perception: a survey of emerging trends. IEEE Access 9, 20067\u201320075 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3055015","DOI":"10.1109\/ACCESS.2021.3055015"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Schembri, M., Seychell, D.: Small object detection in highly variable backgrounds. In: 2019 IEEE 11th International Symposium on Image and Signal Processing and Analysis (ISPA), pp. 32\u201337 (2019)","DOI":"10.1109\/ISPA.2019.8868719"},{"key":"16_CR31","doi-asserted-by":"publisher","unstructured":"Sha, L.: Using simplicity to control complexity. IEEE Softw. 18(4), 20\u201328 (2001). https:\/\/doi.org\/10.1109\/MS.2001.936213","DOI":"10.1109\/MS.2001.936213"},{"key":"16_CR32","unstructured":"Turing, A.M.: Checking a large routine. In: Report of a Conference on High Speed Automatic Calculating Machines, pp. 67\u201369 (1949)"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Turing, A.M.: Computing machinery and intelligence. MIND: Q. Rev. Psychol. Philos. LIX(236), 67\u201369 (1950)","DOI":"10.1093\/mind\/LIX.236.433"}],"container-title":["Lecture Notes in Computer Science","Bridging the Gap Between AI and Reality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75434-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T10:03:13Z","timestamp":1735466593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75434-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,30]]},"ISBN":["9783031754333","9783031754340"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75434-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,30]]},"assertion":[{"value":"30 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bridging the Gap between AI and Reality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aisola2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023-aisola.isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}