{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:53Z","timestamp":1758845693598,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987672","type":"proceedings-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:46:05Z","timestamp":1581389165000},"page":"452-456","source":"Crossref","is-referenced-by-count":8,"title":["Accellerating PRISM Validation of Vehicle Platooning Through Machine Learning"],"prefix":"10.1109","author":[{"given":"Maurizio","family":"Mongelli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Muselli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Scorzoni","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Rule extraction algorithm for deep neural networks: A review","volume":"abs 1610 5267","author":"hailesilassie","year":"2016","journal-title":"CoRR"},{"key":"ref11","article-title":"The lyapunov neural network: Adaptive stability certification for safe learning of dynamic systems","volume":"abs 1808 924","author":"richards","year":"2018","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.206"},{"key":"ref13","first-page":"585","article-title":"PRISM 4.0: Verification of probabilistic real-time systems","volume":"6806","author":"kwiatkowska","year":"2011","journal-title":"Proc 23rd International Conference on Computer Aided Verification (CAV&#x2018;11) ser LNCS G Gopalakrishnan and S Oadeer Eds"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2008.40"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368094"},{"key":"ref16","first-page":"23","author":"holzmann","year":"1997","journal-title":"The Model Checker Spin Ieee Trans on Software Engineering"},{"journal-title":"The state explosion problem in lectures on petri nets i Basic models","year":"1998","author":"valmari","key":"ref17"},{"journal-title":"Counterexample-guided abstraction refinement","year":"2000","author":"clarke","key":"ref18"},{"journal-title":"Applications of craig interpolants in model checking","year":"2005","author":"mcmillan","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3178291.3178293"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2179936"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66583-2_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2017.05.006"},{"journal-title":"What if analysis","year":"0","author":"rizzi","key":"ref8"},{"key":"ref7","article-title":"Performance validation of vehicle platooning through intelligible analytics","author":"mongelli","year":"2018","journal-title":"IET Cyber-Phys Syst Theory Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2018.00018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75390-2_2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.07.003"},{"key":"ref20","first-page":"58","author":"biere","year":"2003","journal-title":"Bounded model checking advances in computers"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"journal-title":"Klee Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs","year":"2008","author":"cadar","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987644"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489614"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.jss.2018.12.006","article-title":"State of the art of cyber-physical systems security: An automatic control perspective","volume":"149","author":"lun","year":"2019","journal-title":"Journal of Systems and Software"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.02.023"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987672.pdf?arnumber=8987672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:39Z","timestamp":1658155779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987672","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}