{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:04Z","timestamp":1740122764989,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T00:00:00Z","timestamp":1697500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T00:00:00Z","timestamp":1697500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1801342","1801546"],"award-info":[{"award-number":["1801342","1801546"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1918140"],"award-info":[{"award-number":["1918140"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000148","name":"Division of Electrical, Communications and Cyber Systems","doi-asserted-by":"publisher","award":["2144416"],"award-info":[{"award-number":["2144416"]}],"id":[{"id":"10.13039\/100000148","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discrete Event Dyn Syst"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10626-023-00386-8","type":"journal-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T05:03:13Z","timestamp":1697518993000},"page":"395-424","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On tolerance of discrete systems with respect to transition perturbations"],"prefix":"10.1007","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3567-9685","authenticated-orcid":false,"given":"R\u00f4mulo","family":"Meira-G\u00f3es","sequence":"first","affiliation":[]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Lafortune","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Tripakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,17]]},"reference":[{"key":"386_CR1","doi-asserted-by":"crossref","unstructured":"Alur R, La Torre S (2001) Deterministic generators and games for LTL fragments. In: Proceedings 16th annual IEEE symposium on logic in computer science, pp 291\u2013300","DOI":"10.1109\/LICS.2001.932505"},{"key":"386_CR2","doi-asserted-by":"crossref","unstructured":"Alves MVS, da Cunha AEC, Carvalho LK, Moreira MV, Basilio JC (2019) Robust supervisory control of discrete event systems against intermittent loss of observations. Int J Control, pp 1\u201313","DOI":"10.1080\/00207179.2019.1690691"},{"key":"386_CR3","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier C, Katoen JP (2008) Principles of Model Checking. The MIT Press"},{"issue":"7","key":"386_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1965724.1965743","volume":"54","author":"T Ball","year":"2011","unstructured":"Ball T, Levin V, Rajamani SK (2011) A decade of software model checking with slam. Commun ACM 54(7):68\u201376","journal-title":"Commun ACM"},{"key":"386_CR5","doi-asserted-by":"crossref","unstructured":"Belta C, Yordanov B, Ayd\u0131n\u00a0G\u00f6l E (2017) Formal Methods for Discrete-Time Dynamical Systems, 1st edn. Springer Publishing Company","DOI":"10.1007\/978-3-319-50763-7"},{"issue":"3","key":"386_CR6","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.jcss.2011.08.007","volume":"78","author":"R Bloem","year":"2012","unstructured":"Bloem R, Jobstmann B, Piterman N, Pnueli A, Sa\u2019ar Y (2012) Synthesis of reactive(1) designs. J Comput Syst Sci 78(3):911\u2013938","journal-title":"J Comput Syst Sci"},{"issue":"3\u20134","key":"386_CR7","first-page":"193","volume":"51","author":"R Bloem","year":"2014","unstructured":"Bloem R, Chatterjee K, Greimel K, Henzinger TA, Hofferek G, Jobstmann B, K\u00f6nighofer B, K\u00f6nighofer R (2014) Synthesizing robust systems. Acta Inf 51(3\u20134):193\u2013220","journal-title":"Synthesizing robust systems. Acta Inf"},{"key":"386_CR8","doi-asserted-by":"crossref","unstructured":"Bloem R, Greimel K, Henzinger TA, Jobstmann B (2009) Synthesizing robust systems. In: 2009 Formal methods in computer-aided design, pp 85\u201392","DOI":"10.1109\/FMCAD.2009.5351139"},{"key":"386_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-85361-9_16","volume-title":"CONCUR 2008 - Concurrency Theory","author":"B Bonakdarpour","year":"2008","unstructured":"Bonakdarpour B, Kulkarni SS (2008) Sycraft: a tool for synthesizing distributed fault-tolerant programs. In: van Breugel F, Chechik M (eds) CONCUR 2008 - Concurrency Theory. Springer, Berlin Heidelberg, pp 167\u2013171"},{"issue":"3","key":"386_CR10","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"RE Bryant","year":"1992","unstructured":"Bryant RE (1992) Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput Surv 24(3):293\u2013318","journal-title":"ACM Comput Surv"},{"key":"386_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72274-6","volume-title":"Introduction to discrete event systems","author":"CG Cassandras","year":"2021","unstructured":"Cassandras CG, Lafortune S (2021) Introduction to discrete event systems, 3rd edn. Springer, Cham","edition":"3"},{"key":"386_CR12","doi-asserted-by":"crossref","unstructured":"Chaudhuri S, Gulwani S, Lublinerman R, Navidpour S (2011) Proving programs robust. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, ESEC\/FSE \u201911. Association for Computing Machinery, pp 102\u2013112","DOI":"10.1145\/2025113.2025131"},{"key":"386_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-18275-4_10","volume-title":"Verification, model checking, and abstract interpretation","author":"CH Cheng","year":"2011","unstructured":"Cheng CH, Rue\u00df H, Knoll A, Buckl C (2011) Synthesis of fault-tolerant embedded systems using games: from theory to practice. In: Jhala R, Schmidt D (eds) Verification, model checking, and abstract interpretation. Springer, Berlin Heidelberg, pp 118\u2013133"},{"key":"386_CR14","doi-asserted-by":"crossref","unstructured":"Classen A, Cordy M, Schobbens PY, Heymans P, Legay A, Raskin JF (2013) Featured transition systems: foundations for verifying variability-intensive systems and their application to LTL model checking. IEEE Trans Softw Eng 39(8)","DOI":"10.1109\/TSE.2012.86"},{"key":"386_CR15","doi-asserted-by":"crossref","unstructured":"Classen A, Heymans P, Schobbens PY, Legay A, Raskin JF (2010) Model checking lots of systems: efficient verification of temporal properties in software product lines. In: 2010 ACM\/IEEE 32nd International conference on software engineering, vol 1, pp 335\u2013344","DOI":"10.1145\/1806799.1806850"},{"issue":"2","key":"386_CR16","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/9.746270","volume":"44","author":"J Cury","year":"1999","unstructured":"Cury J, Krogh B (1999) Robustness of supervisors for discrete-event systems. IEEE Trans Autom Control 44(2):376\u2013379","journal-title":"IEEE Trans Autom Control"},{"key":"386_CR17","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-32759-9_15","volume-title":"FM 2012: formal methods","author":"N D\u2019Ippolito","year":"2012","unstructured":"D\u2019Ippolito N, Braberman V, Piterman N, Uchitel S (2012) The modal transition system control problem. In: Giannakopoulou D, M\u00e9ry D (eds) FM 2012: formal methods. Springer, Berlin Heidelberg, pp 155\u2013170"},{"key":"386_CR18","doi-asserted-by":"crossref","unstructured":"Dureja R, Rozier KY (2017) FuseIC3: an algorithm for checking large design spaces. In: 2017 Formal methods in computer aided design (FMCAD), pp 164\u2013171","DOI":"10.23919\/FMCAD.2017.8102255"},{"issue":"5","key":"386_CR19","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10009-008-0083-0","volume":"10","author":"A Ebnenasir","year":"2008","unstructured":"Ebnenasir A, Kulkarni SS, Arora A (2008) FTSyn: a framework for automatic synthesis of fault-tolerance. Int J Softw Tools Technol Transf 10(5):455\u2013471","journal-title":"Int J Softw Tools Technol Transf"},{"key":"386_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10626-015-0223-0","volume":"27","author":"R Ehlers","year":"2017","unstructured":"Ehlers R, Lafortune S, Tripakis S, Vardi MY (2017) Supervisory control and reactive synthesis: a comparative introduction. Discrete Event Dynamic Systems 27:209\u2013260","journal-title":"Discrete Event Dynamic Systems"},{"key":"386_CR21","volume-title":"31st International conference on concurrency theory (CONCUR 2020), Leibniz International Proceedings in Informatics (LIPIcs), vol 171, pp 17:1\u201317:21","author":"E Filiot","year":"2020","unstructured":"Filiot E, Mazzocchi N, Raskin JF, Sankaranarayanan S, Trivedi A (2020) Weighted transducers for robustness verification. In: Konnov I, Kov\u00e1cs L (eds) 31st International conference on concurrency theory (CONCUR 2020), Leibniz International Proceedings in Informatics (LIPIcs), vol 171, pp 17:1\u201317:21. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany"},{"issue":"1","key":"386_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/311531.311532","volume":"31","author":"FC G\u00e4rtner","year":"1999","unstructured":"G\u00e4rtner FC (1999) Fundamentals of fault-tolerant distributed computing in asynchronous environments. ACM Comput Surv 31(1):1\u201326","journal-title":"ACM Comput Surv"},{"key":"386_CR23","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10703-009-0084-y","volume":"35","author":"A Girault","year":"2009","unstructured":"Girault A, Rutten E (2009) Automating the addition of fault tolerance with discrete controller synthesis. Formal Methods in System Design 35:190\u2013225","journal-title":"Formal Methods in System Design"},{"volume-title":"Automata logics, and infinite games: a guide to current research","year":"2002","key":"386_CR24","unstructured":"Gr\u00e4del E, Thomas W, Wilke T (eds) (2002) Automata logics, and infinite games: a guide to current research. Springer-Verlag, Berlin, Heidelberg"},{"key":"386_CR25","unstructured":"Henzinger TA, Otop J, Samanta R (2014) Lipschitz robustness of finite-state transducers. In: Raman V, Suresh SP (eds) 34th International conference on foundation of software technology and theoretical computer science (FSTTCS 2014), Leibniz International Proceedings in Informatics (LIPIcs), vol 29, pp 431\u2013443. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany,"},{"key":"386_CR26","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/3-540-45309-1_11","volume-title":"Programming languages and systems","author":"M Huth","year":"2001","unstructured":"Huth M, Jagadeesan R, Schmidt D (2001) Modal transition systems: a foundation for three-valued program analysis. In: Sands D (ed) Programming languages and systems. Springer, Berlin Heidelberg, pp 155\u2013169"},{"key":"386_CR27","doi-asserted-by":"crossref","unstructured":"Kang E (2020) Robustness analysis for secure software design. In: Proceedings of the 3rd ACM SIGSOFT international workshop on software security from design to deployment, SEAD 2020, p 19\u201325. Association for Computing Machinery","DOI":"10.1145\/3416507.3423191"},{"key":"386_CR28","doi-asserted-by":"crossref","unstructured":"Larsen K, Thomsen B (1988) A modal process logic. In: 1988 Proceedings. Third annual symposium on logic in computer science, pp 203\u2013210","DOI":"10.1109\/LICS.1988.5119"},{"issue":"12","key":"386_CR29","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/9.250564","volume":"38","author":"F Lin","year":"1993","unstructured":"Lin F (1993) Robust and adaptive supervisory control of discrete event systems. IEEE Trans Autom Control 38(12):1848\u20131852","journal-title":"IEEE Trans Autom Control"},{"issue":"2","key":"386_CR30","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1137\/130914942","volume":"52","author":"F Lin","year":"2014","unstructured":"Lin F (2014) Control of networked discrete event systems: dealing with communication delays and losses. SIAM J Control Optim 52(2):1276\u20131298","journal-title":"SIAM J Control Optim"},{"key":"386_CR31","doi-asserted-by":"crossref","unstructured":"Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors. In: 2019 IEEE 58th Conference on Decision and Control (CDC), pp 7659\u20137664","DOI":"10.1109\/CDC40024.2019.9030171"},{"key":"386_CR32","volume-title":"Distributed Algorithms","author":"NA Lynch","year":"1996","unstructured":"Lynch NA (1996) Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA"},{"key":"386_CR33","doi-asserted-by":"crossref","unstructured":"Majumdar R, Render E, Tabuada P (2011) Robust discrete synthesis against unspecified disturbances. In: Proceedings of the 14th International conference on hybrid systems: computation and control, HSCC \u201911, p 211\u2013220. Association for Computing Machinery","DOI":"10.1145\/1967701.1967732"},{"key":"386_CR34","doi-asserted-by":"crossref","unstructured":"Majumdar R, Render E, Tabuada P (2013) A theory of robust omega-regular software synthesis. ACM Trans Embed Comput Syst 13(3)","DOI":"10.1145\/2539036.2539044"},{"issue":"10","key":"386_CR35","doi-asserted-by":"publisher","first-page":"4990","DOI":"10.1109\/TAC.2021.3051459","volume":"66","author":"R Meira-Goes","year":"2021","unstructured":"Meira-Goes R, Lafortune S, Marchand H (2021) Synthesis of supervisors robust against sensor deception attacks. IEEE Trans Autom Control 66(10):4990\u20134997","journal-title":"IEEE Trans Autom Control"},{"key":"386_CR36","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Dardik I, Kang E, Lafortune S, Tripakis S (2023) Safe environmental envelopes of discrete systems. In: (to appear) Computer aided verification","DOI":"10.1007\/978-3-031-37706-8_17"},{"key":"386_CR37","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Kang E, Lafortune S, Tripakis S (2022) On synthesizing tolerable and permissive controllers for labeled transition systems. In: 16th IFAC Workshop on discrete event systems WODES 2022","DOI":"10.1016\/j.ifacol.2022.10.338"},{"key":"386_CR38","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Marchand H, Lafortune S (2019) Towards resilient supervisors against sensor deception attacks. In: 2019 IEEE 58th Annual conference on decision and control (CDC)","DOI":"10.1109\/CDC40024.2019.9029737"},{"key":"386_CR39","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Marchand H, Lafortune S (2022) Dealing with sensor and actuator deception attacks in supervisory control. Automatica","DOI":"10.1016\/j.automatica.2022.110736"},{"key":"386_CR40","unstructured":"Meira-G\u00f3es R, Wintenberg A, Matsui S, Lafortune S (2017) MDESops: an open-source software tool for discrete event systems modeled by automata. In: Proc 22nd IFAC World Congr"},{"issue":"1","key":"386_CR41","first-page":"195","volume":"57","author":"D Neider","year":"2020","unstructured":"Neider D, Weinert A, Zimmermann M (2020) Synthesizing optimally resilient controllers. Acta Inf 57(1):195\u2013221","journal-title":"Synthesizing optimally resilient controllers. Acta Inf"},{"issue":"4","key":"386_CR42","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2699417","volume":"58","author":"C Newcombe","year":"2015","unstructured":"Newcombe C, Rath T, Zhang F, Munteanu B, Brooker M, Deardeuff M (2015) How amazon web services uses formal methods. Commun ACM 58(4):66\u201373","journal-title":"Commun ACM"},{"issue":"8","key":"386_CR43","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1016\/j.automatica.2005.03.017","volume":"41","author":"A Paoli","year":"2005","unstructured":"Paoli A, Lafortune S (2005) Safe diagnosability for fault-tolerant supervision of discrete-event systems. Automatica 41(8):1335\u20131347","journal-title":"Automatica"},{"issue":"2","key":"386_CR44","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM 27(2):228\u2013234","journal-title":"J ACM"},{"key":"386_CR45","doi-asserted-by":"crossref","unstructured":"Pnueli A (1977) The temporal logic of programs. In: 18th Annual symposium on foundations of computer science (sfcs 1977), pp 46\u201357","DOI":"10.1109\/SFCS.1977.32"},{"key":"386_CR46","doi-asserted-by":"crossref","unstructured":"Pnueli A, Rosner R (1989) On the synthesis of a reactive module. In: Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL \u201989, pp 179\u2013190. Association for Computing Machinery","DOI":"10.1145\/75277.75293"},{"issue":"1","key":"386_CR47","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge PJ, Wonham WM (1987) Supervisory control of a class of discrete event processes. SIAM J Control Optim 25(1):206\u2013230","journal-title":"SIAM J Control Optim"},{"issue":"29","key":"386_CR48","first-page":"272","volume":"45","author":"K Rohloff","year":"2012","unstructured":"Rohloff K (2012) Bounded sensor failure tolerant supervisory control. 11th IFAC Workshop on Discrete Event Systems 45(29):272\u2013277","journal-title":"11th IFAC Workshop on Discrete Event Systems"},{"key":"386_CR49","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-02444-8_30","volume-title":"Automated technology for verification and analysis","author":"R Samanta","year":"2013","unstructured":"Samanta R, Deshmukh JV, Chaudhuri S (2013) Robustness analysis of string transducers. In: Van Hung D, Ogawa M (eds) Automated technology for verification and analysis. Springer Publishing Company, pp 427\u2013441"},{"key":"386_CR50","doi-asserted-by":"crossref","unstructured":"Samuel S, Mallik K, Schmuck AK, Neider D (2020) Resilient abstraction-based controller design. In: 2020 59th IEEE conference on decision and control (CDC), pp 2123\u20132129","DOI":"10.1109\/CDC42340.2020.9303932"},{"issue":"1","key":"386_CR51","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10626-019-00299-5","volume":"30","author":"AK Schmuck","year":"2020","unstructured":"Schmuck AK, Moor T, Majumdar R (2020) On the relation between reactive synthesis and supervisory control of non-terminating processes. Discrete Event Dynamic Systems 30(1):81\u2013124","journal-title":"Discrete Event Dynamic Systems"},{"key":"386_CR52","doi-asserted-by":"crossref","unstructured":"Tabuada P (2009) Verification and control of hybrid systems: a symbolic approach, 1st edn. Springer Publishing Company","DOI":"10.1007\/978-1-4419-0224-5_1"},{"key":"386_CR53","volume-title":"25th EACSL Annual conference on computer science logic (CSL 2016), Leibniz International Proceedings in Informatics (LIPIcs), vol 62, pp 10:1\u201310:21","author":"P Tabuada","year":"2016","unstructured":"Tabuada P, Neider D (2016) Robust linear temporal logic. In: Talbot JM, Regnier L (eds) 25th EACSL Annual conference on computer science logic (CSL 2016), Leibniz International Proceedings in Informatics (LIPIcs), vol 62, pp 10:1\u201310:21. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany"},{"key":"386_CR54","doi-asserted-by":"crossref","unstructured":"Tabuada P, Balkan A, Caliskan SY, Shoukry Y, Majumdar R (2012) Input-output robustness for discrete systems. In: Proceedings of the tenth ACM international conference on embedded software, EMSOFT \u201912, p 217\u2013226. Association for Computing Machinery","DOI":"10.1145\/2380356.2380396"},{"issue":"3","key":"386_CR55","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.automatica.2003.11.006","volume":"40","author":"S Takai","year":"2004","unstructured":"Takai S (2004) Maximizing robustness of supervisors for partially observed discrete event systems. Automatica 40(3):531\u2013535","journal-title":"Automatica"},{"key":"386_CR56","doi-asserted-by":"crossref","unstructured":"Topcu U, Ozay N, Liu J, Murray RM (2012) On synthesizing robust discrete controllers under modeling uncertainty. In: Proceedings of the 15th ACM international conference on hybrid systems: computation and control, HSCC \u201912, pp 85\u201394. Association for Computing Machinery","DOI":"10.1145\/2185632.2185648"},{"issue":"4","key":"386_CR57","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/TASE.2016.2588527","volume":"13","author":"F Wang","year":"2016","unstructured":"Wang F, Shu S, Lin F (2016) Robust networked control of discrete event systems. IEEE Trans Autom Sci Eng 13(4):1528\u20131540","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"1","key":"386_CR58","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1137\/S0363012991219766","volume":"33","author":"S Young","year":"1995","unstructured":"Young S, Garg VK (1995) Model uncertainty in discrete event systems. SIAM J Control Optim 33(1):208\u2013226","journal-title":"SIAM J Control Optim"},{"key":"386_CR59","doi-asserted-by":"crossref","unstructured":"Zhang C, Garlan D, Kang E (2020) A behavioral notion of robustness for software systems. In: Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, ESEC\/FSE 2020, pp 1\u201312. Association for Computing Machinery","DOI":"10.1145\/3368089.3409753"}],"container-title":["Discrete Event Dynamic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-023-00386-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10626-023-00386-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-023-00386-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T09:05:18Z","timestamp":1699866318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10626-023-00386-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,17]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["386"],"URL":"https:\/\/doi.org\/10.1007\/s10626-023-00386-8","relation":{},"ISSN":["0924-6703","1573-7594"],"issn-type":[{"type":"print","value":"0924-6703"},{"type":"electronic","value":"1573-7594"}],"subject":[],"published":{"date-parts":[[2023,10,17]]},"assertion":[{"value":"13 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}