{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:28:05Z","timestamp":1767065285232,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/etfa54631.2023.10275704","type":"proceedings-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T13:38:14Z","timestamp":1697117894000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Model Checking of Hyperledger Fabric Smart Contracts"],"prefix":"10.1109","author":[{"given":"Elmira","family":"Ebrahimi","sequence":"first","affiliation":[{"name":"TU Hamburg,Christian Doppler Laboratory for Blockchain Technologies for the Internet of Things,Hamburg,Germany"}]},{"given":"Ehsan","family":"Khamespanah","sequence":"additional","affiliation":[{"name":"University of Tehran,School of ECE,Tehran,Iran"}]},{"given":"Marjan","family":"Sirjani","sequence":"additional","affiliation":[{"name":"M&#x00E4;lardalen University,School of IDT,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Siamak","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"University of Tehran,School of ECE,Tehran,Iran"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64354-6_8"},{"key":"ref12","first-page":"321","author":"ding","year":"2021","journal-title":"HFContractFuzzer Fuzzing Hyperledger Fabric Smart Contracts for Vulnerability Detection"},{"journal-title":"Model checking","year":"2018","author":"clarke","key":"ref15"},{"key":"ref14","first-page":"385","article-title":"Modeling and verification of reactive systems using rebeca","volume":"63","author":"sirjani","year":"2004","journal-title":"Fundamenta Informaticae"},{"year":"2023","key":"ref11","article-title":"Truffle unit testing"},{"year":"2023","key":"ref10","article-title":"Chaincode scanner"},{"key":"ref2","article-title":"Ethereum white paper: a next generation smart contract & decentralized application platform","volume":"53","author":"buterin","year":"2014","journal-title":"first version"},{"journal-title":"Bitcoin and Cryptocurrency Technologies A Comprehensive Introduction","year":"2016","author":"narayanan","key":"ref1"},{"article-title":"Pre-deployment analysis of smart contracts&#x2013;a survey","year":"2023","author":"munir","key":"ref17"},{"year":"2023","key":"ref16","article-title":"Afra"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3531342"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00049"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2018.03.010"},{"year":"2023","key":"ref25","article-title":"Thesis codes"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3191697.3213790"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3578527.3578538"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666486"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"article-title":"Practical mitigation of smart contract bugs","year":"2022","author":"giesen","key":"ref5"}],"event":{"name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2023,9,12]]},"location":"Sinaia, Romania","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275065\/10275329\/10275704.pdf?arnumber=10275704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T14:44:00Z","timestamp":1698677040000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/etfa54631.2023.10275704","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}