{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:46:08Z","timestamp":1766043968514,"version":"3.48.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032054340"},{"type":"electronic","value":"9783032054357"}],"license":[{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05435-7_21","type":"book-chapter","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T01:30:44Z","timestamp":1757727044000},"page":"377-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Practical Approach to\u00a0Runtime Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8348-6163","authenticated-orcid":false,"given":"Raik","family":"Hipler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8301-4752","authenticated-orcid":false,"given":"Hannes","family":"Kallwies","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3696-9222","authenticated-orcid":false,"given":"Martin","family":"Leucker","sequence":"additional","affiliation":[]},{"given":"Kevin Gillian","family":"van Dommele","sequence":"additional","affiliation":[]},{"given":"Jannis","family":"Wien","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2025.104455","volume":"155","author":"AJ Akande","year":"2025","unstructured":"Akande, A.J., Hou, Z., Foo, E., Li, Q.: LTL-based runtime verification framework for cyber-attack anomaly prediction in cyber-physical systems. Comput. Secur. 155, 104455 (2025). https:\/\/doi.org\/10.1016\/J.COSE.2025.104455","journal-title":"Comput. Secur."},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TSE.1983.237017","volume":"9","author":"T Anderson","year":"1983","unstructured":"Anderson, T., Knight, J.C.: A framework for software fault tolerance in real-time systems. IEEE Trans. Softw. Eng. 9(3), 355\u2013364 (1983). https:\/\/doi.org\/10.1109\/TSE.1983.237017","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Bartocci, E., Falcone, Y. (eds.): Lectures on Runtime Verification - Introductory and Advanced Topics, Lecture Notes in Computer Science, vol. 10457. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5","key":"21_CR3","DOI":"10.1007\/978-3-319-75632-5"},{"doi-asserted-by":"publisher","unstructured":"Basin, D.A., Klaedtke, F., M\u00fcller, S., Zalinescu, E.: Monitoring metric first-order temporal properties. J. ACM 62(2), 15:1\u201315:45 (2015). https:\/\/doi.org\/10.1145\/2699444","key":"21_CR4","DOI":"10.1145\/2699444"},{"doi-asserted-by":"publisher","unstructured":"Basin, D.A., Klaedtke, F., Zalinescu, E.: The monpoly monitoring tool. In: Reger, G., Havelund, K. (eds.) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, USA. Kalpa Publications in Computing, vol.\u00a03, pp. 19\u201328. EasyChair (2017). https:\/\/doi.org\/10.29007\/89HS","key":"21_CR5","DOI":"10.29007\/89HS"},{"doi-asserted-by":"publisher","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky, O., Tasiran, S. (eds.) Runtime Verification, 7th International Workshop, RV 2007, Vancouver, Canada, March 13, 2007, Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a04839, pp. 126\u2013138. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-77395-5_11","key":"21_CR6","DOI":"10.1007\/978-3-540-77395-5_11"},{"doi-asserted-by":"publisher","unstructured":"Bauer, A., Leucker, M., Streit, J.: SALT - structured assertion language for temporal logic. In: Liu, Z., He, J. (eds.) Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, ICFEM 2006, Macao, China, November 1-3, 2006, Proceedings. Lecture Notes in Computer Science, vol.\u00a04260, pp. 757\u2013775. Springer (2006). https:\/\/doi.org\/10.1007\/11901433_41","key":"21_CR7","DOI":"10.1007\/11901433_41"},{"doi-asserted-by":"crossref","unstructured":"Baumeister, J., Finkbeiner, B., Schirmer, S., Schwenger, M., Torens, C.: RTLola cleared for take-off: monitoring autonomous aircraft. In: Proceedings of 32nd Int\u2019l Conf. on Computer-Aided Verification CAV\u201920, pp. 28\u201339. Springer (2020)","key":"21_CR8","DOI":"10.1007\/978-3-030-53291-8_3"},{"doi-asserted-by":"publisher","unstructured":"Baumeister, J., Finkbeiner, B., Schirmer, S., Schwenger, M., Torens, C.: Rtlola cleared for take-off: monitoring autonomous aircraft. In: Lahiri, S.K., Wang, C. (eds.) Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II. Lecture Notes in Computer Science, vol. 12225, pp. 28\u201339. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-53291-8_3","key":"21_CR9","DOI":"10.1007\/978-3-030-53291-8_3"},{"doi-asserted-by":"publisher","unstructured":"Begemann, M.J., Kallwies, H., Leucker, M., Schmitz, M.: Tessla-ros-bridge - runtime verification of robotic systems. In: \u00c1brah\u00e1m, E., Dubslaff, C., Tarifa, S.L.T. (eds.) Theoretical Aspects of Computing - ICTAC 2023 - 20th International Colloquium, Lima, Peru, December 4-8, 2023, Proceedings. Lecture Notes in Computer Science, vol. 14446, pp. 388\u2013398. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-47963-2_23","key":"21_CR10","DOI":"10.1007\/978-3-031-47963-2_23"},{"issue":"10","key":"21_CR11","doi-asserted-by":"publisher","first-page":"2544","DOI":"10.1109\/TSE.2024.3444697","volume":"50","author":"R Caldas","year":"2024","unstructured":"Caldas, R., Garc\u00eda, J.A.P., Schiopu, M., Pelliccione, P., Rodrigues, G.N., Berger, T.: Runtime verification and field-based testing for ROS-based robotic systems. IEEE Trans. Softw. Eng. 50(10), 2544\u20132567 (2024). https:\/\/doi.org\/10.1109\/TSE.2024.3444697","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Ceresa, M., Gorostiaga, F., S\u00e1nchez, C.: Declarative stream runtime verification (hLola). In: d.\u00a0S.\u00a0Oliveira, B.C. (ed.) Programming Languages and Systems - 18th Asian Symposium, APLAS 2020, Fukuoka, Japan, November 30 - December 2, 2020, Proceedings. Lecture Notes in Computer Science, vol. 12470, pp. 25\u201343. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-64437-6_2","key":"21_CR12","DOI":"10.1007\/978-3-030-64437-6_2"},{"doi-asserted-by":"publisher","unstructured":"Convent, L., Hungerecker, S., Leucker, M., Scheffel, T., Schmitz, M., Thoma, D.: TeSSLa: Temporal stream-based specification language. In: Proceedings of the 21th Brazilian Symposium on Formal Methods (SBMF\u201918). LNCS, vol. 11254, pp. 144\u2013162. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03044-5_10","key":"21_CR13","DOI":"10.1007\/978-3-030-03044-5_10"},{"doi-asserted-by":"publisher","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: Proceedings of the 12th International Symposium of Temporal Representation and Reasoning (TIME\u201905), pp. 166\u2013174. IEEE Computer Society (2005). https:\/\/doi.org\/10.1109\/TIME.2005.26","key":"21_CR14","DOI":"10.1109\/TIME.2005.26"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"84091","DOI":"10.1109\/ACCESS.2023.3298329","volume":"11","author":"LM Danielsson","year":"2023","unstructured":"Danielsson, L.M., S\u00e1nchez, C.: Decentralized stream runtime verification for timed asynchronous networks. IEEE Access 11, 84091\u201384112 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3298329","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Dong, W., Leucker, M., Schallhart, C.: Impartial anticipation in runtime-verification. In: Cha, S.D., Choi, J., Kim, M., Lee, I., Viswanathan, M. (eds.) Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings. Lecture Notes in Computer Science, vol.\u00a05311, pp. 386\u2013396. Springer (2008). https:\/\/doi.org\/10.1007\/978-3-540-88387-6_33","key":"21_CR16","DOI":"10.1007\/978-3-540-88387-6_33"},{"doi-asserted-by":"publisher","unstructured":"Friese, M.J., Kallwies, H., Leucker, M., Sachenbacher, M., Streichhahn, H., Thoma, D.: Runtime verification of AUTOSAR timing extensions. In: Abdedda\u00efm, Y., Cucu-Grosjean, L., Nelissen, G., Pautet, L. (eds.) RTNS 2022: The 30th International Conference on Real-Time Networks and Systems, Paris, France, June 7 - 8, 2022, pp. 173\u2013183. ACM (2022). https:\/\/doi.org\/10.1145\/3534879.3534898","key":"21_CR17","DOI":"10.1145\/3534879.3534898"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/S10703-024-00450-5","volume":"64","author":"R Ganguly","year":"2024","unstructured":"Ganguly, R., Momtaz, A., Bonakdarpour, B.: Runtime verification of partially-synchronous distributed system. Formal Methods Syst. Des. 64(1), 146\u2013177 (2024). https:\/\/doi.org\/10.1007\/S10703-024-00450-5","journal-title":"Formal Methods Syst. Des."},{"doi-asserted-by":"publisher","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Striver: stream runtime verification for real-time event-streams. In: Proceedings of the 18th International Conference on Runtime Verification (RV\u201918). LNCS, vol. 11237, pp. 282\u2013298. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_16","key":"21_CR19","DOI":"10.1007\/978-3-030-03769-7_16"},{"doi-asserted-by":"publisher","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: HStriver: a very functional extensible tool for the runtime verification of real-time event streams. In: Huisman, M., Pasareanu, C.S., Zhan, N. (eds.) Formal Methods - 24th International Symposium, FM 2021, Virtual Event, November 20-26, 2021, Proceedings. Lecture Notes in Computer Science, vol. 13047, pp. 563\u2013580. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-90870-6_30","key":"21_CR20","DOI":"10.1007\/978-3-030-90870-6_30"},{"doi-asserted-by":"publisher","unstructured":"Kallwies, H., Leucker, M., Schmitz, M., Schulz, A., Thoma, D., Weiss, A.: TeSSLa - an ecosystem for runtime verification. In: Proceedings of the 22nd International Conference on Runtime Verification (RV\u201922). LNCS, vol. 13498, pp. 314\u2013324. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17196-3_20","key":"21_CR21","DOI":"10.1007\/978-3-031-17196-3_20"},{"doi-asserted-by":"publisher","unstructured":"Kharraz, K.Y., Leucker, M., Schneider, G.: Timed dyadic deontic logic. In: Schweighofer, E. (ed.) Legal Knowledge and Information Systems - JURIX 2021: The Thirty-fourth Annual Conference, Vilnius, Lithuania, 8-10 December 2021. Frontiers in Artificial Intelligence and Applications, vol.\u00a0346, pp. 197\u2013204. IOS Press (2021).https:\/\/doi.org\/10.3233\/FAIA210336","key":"21_CR22","DOI":"10.3233\/FAIA210336"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01995674","volume":"2","author":"R Koymans","year":"1990","unstructured":"Koymans, R.: Specifying real-time properties with metric temporal logic. Real Time Syst. 2(4), 255\u2013299 (1990). https:\/\/doi.org\/10.1007\/BF01995674","journal-title":"Real Time Syst."},{"doi-asserted-by":"publisher","unstructured":"Leucker, M.: Teaching runtime verification. In: Khurshid, S., Sen, K. (eds.) Runtime Verification - Second International Conference, RV 2011, San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a07186, pp. 34\u201348. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_4","key":"21_CR24","DOI":"10.1007\/978-3-642-29860-8_4"},{"issue":"5","key":"21_CR25","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Logic Algebr. Progr. 78(5), 293\u2013303 (2009)","journal-title":"J. Logic Algebr. Progr."},{"key":"21_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/J.SCICO.2024.103230","volume":"241","author":"E Mahe","year":"2025","unstructured":"Mahe, E., Bannour, B., Gaston, C., Gall, P.L.: Efficient interaction-based offline runtime verification of distributed systems with lifeline removal. Sci. Comput. Program. 241, 103230 (2025). https:\/\/doi.org\/10.1016\/J.SCICO.2024.103230","journal-title":"Sci. Comput. Program."},{"doi-asserted-by":"publisher","unstructured":"Maler, O., Nickovic, D.: Monitoring temporal properties of continuous signals. In: Proceedings of the Joint International Conferences on Formal Modelling and Analysis of Timed Systems (FORMATS\u201904) and Formal Techniques in Real-Time and Fault-Tolerant Systems (FTRTFT\u201904). LNCS, vol.\u00a03253, pp. 152\u2013166. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12","key":"21_CR27","DOI":"10.1007\/978-3-540-30206-3_12"},{"doi-asserted-by":"publisher","unstructured":"Mavin, A., Wilkinson, P., Harwood, A.R.G., Novak, M.: Easy approach to requirements syntax (EARS). In: RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009, pp. 317\u2013322. IEEE Computer Society (2009). https:\/\/doi.org\/10.1109\/RE.2009.9","key":"21_CR28","DOI":"10.1109\/RE.2009.9"},{"doi-asserted-by":"publisher","unstructured":"Mitra, S., Seshia, S.A., Nicolici, N.: Post-silicon validation opportunities, challenges and recent advances. In: Sapatnekar, S.S. (ed.) Proceedings of the 47th Design Automation Conference, DAC 2010, Anaheim, California, USA, July 13-18, 2010, pp. 12\u201317. ACM (2010). https:\/\/doi.org\/10.1145\/1837274.1837280","key":"21_CR29","DOI":"10.1145\/1837274.1837280"},{"doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October - 1 November 1977, pp. 46\u201357. IEEE Computer Society (1977). https:\/\/doi.org\/10.1109\/SFCS.1977.32","key":"21_CR30","DOI":"10.1109\/SFCS.1977.32"},{"unstructured":"Requeno, J.I., et al.: Runtime verification of timed petri nets. In: K\u00f6hler-Bussmeier, M., Moldt, D., R\u00f6lke, H. (eds.) Proceedings of the International Workshop on Petri Nets and Software Engineering 2024 co-located with the 45th International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2024), June 24 - 25, 2024, Geneva, Switzerland. CEUR Workshop Proceedings, vol.\u00a03730, pp. 122\u2013131. CEUR-WS.org (2024). https:\/\/ceur-ws.org\/Vol-3730\/paper07.pdf","key":"21_CR31"},{"doi-asserted-by":"publisher","unstructured":"S\u00e1nchez, C.: Online and offline stream runtime verification of synchronous systems. In: Proceedings of the 18th International Conference on Runtime Verification (RV\u201918). LNCS, vol. 11237, pp. 138\u2013163. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_9","key":"21_CR32","DOI":"10.1007\/978-3-030-03769-7_9"},{"issue":"10","key":"21_CR33","doi-asserted-by":"publisher","first-page":"4510","DOI":"10.1109\/TSE.2023.3301660","volume":"49","author":"A Torres","year":"2023","unstructured":"Torres, A., et al.: Runtime verification of crypto APIs: an empirical study. IEEE Trans. Softw. Eng. 49(10), 4510\u20134525 (2023). https:\/\/doi.org\/10.1109\/TSE.2023.3301660","journal-title":"IEEE Trans. Softw. Eng."},{"unstructured":"Wien, J.: Runtime Verification for a Semiconductor V &V Software. Master\u2019s thesis, University of L\u00fcbeck (2025)","key":"21_CR34"},{"doi-asserted-by":"publisher","unstructured":"Yang, F., Zhan, S.S., Wang, Y., Huang, C., Zhu, Q.: Case study: runtime safety verification of neural network controlled system. In: \u00c1brah\u00e1m, E., Abbas, H. (eds.) Runtime Verification - 24th International Conference, RV 2024, Istanbul, Turkey, October 15-17, 2024, Proceedings. Lecture Notes in Computer Science, vol. 15191, pp. 205\u2013217. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-74234-7_13","key":"21_CR35","DOI":"10.1007\/978-3-031-74234-7_13"},{"issue":"1","key":"21_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/S00607-024-01375-X","volume":"107","author":"F Yousefinejad","year":"2025","unstructured":"Yousefinejad, F., Jalili, S.: Runtime verification of electronic stability control system in automated vehicles with stl$$ _{\\text{3 }}$$ formalism. Computing 107(1), 33 (2025). https:\/\/doi.org\/10.1007\/S00607-024-01375-X","journal-title":"Computing"},{"doi-asserted-by":"publisher","unstructured":"Zhang, X., Leucker, M., Dong, W.: Runtime verification with predictive semantics. In: Goodloe, A., Person, S. (eds.) NASA Formal Methods - 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings. Lecture Notes in Computer Science, vol.\u00a07226, pp. 418\u2013432. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-28891-3_37","key":"21_CR37","DOI":"10.1007\/978-3-642-28891-3_37"},{"doi-asserted-by":"publisher","unstructured":"Ziani, Y., Kosmatov, N., Loulergue, F., P\u00e9rez, D.G.: Runtime verification for high-level security properties: case study on the TPM software stack. In: Huisman, M., Howar, F. (eds.) Tests and Proofs - 18th International Conference, TAP 2024, Milan, Italy, September 9-10, 2024, Proceedings. Lecture Notes in Computer Science, vol. 15153, pp. 87\u2013106. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-72044-4_5","key":"21_CR38","DOI":"10.1007\/978-3-031-72044-4_5"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05435-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:43:29Z","timestamp":1766043809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05435-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"ISBN":["9783032054340","9783032054357"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05435-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"12 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv25.isec.tugraz.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}