{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:13:38Z","timestamp":1730272418648,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/iscc58397.2023.10217842","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T13:46:48Z","timestamp":1693230408000},"page":"1299-1304","source":"Crossref","is-referenced-by-count":0,"title":["A Correct by Construction Model for CBPS Systems Verification"],"prefix":"10.1109","author":[{"given":"Sarah Hussein","family":"Toman","sequence":"first","affiliation":[{"name":"University of Monastir, University of Al-Qadisiyah,Computer Science Department FSM,Monastir,Tunisia"}]},{"given":"Aida","family":"Lahouij","sequence":"additional","affiliation":[{"name":"University of Monastir,Computer Science Department ISIMM,Monastir,Tunisia"}]},{"given":"Lazhar","family":"Hamel","sequence":"additional","affiliation":[{"name":"University of Monastir,Computer Science Department ISIMM,Monastir,Tunisia"}]},{"given":"Zinah Hussein","family":"Toman","sequence":"additional","affiliation":[{"name":"University of Monastir, University of Al-Qadisiyah,Computer Science Department FSM,Monastir,Tunisia"}]},{"given":"Mohamed","family":"Graiet","sequence":"additional","affiliation":[{"name":"IMT Atlantique, LS2N,Nantes,France"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.42"},{"key":"ref15","first-page":"199","article-title":"On accurate automatic ver-ification of publish-subscribe architectures","author":"baresi","year":"0","journal-title":"29th International Conference on Software Engineering (ICSE'07)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.879"},{"key":"ref10","article-title":"Formal verification of the implementation of the mqtt protocol in iot devices","author":"mladenov","year":"2017","journal-title":"SNE Master Research Projects 2016&#x2013;2017"},{"key":"ref2","first-page":"1","article-title":"Quality of service in publish\/subscribe middleware","volume":"19","author":"corsaro","year":"2006","journal-title":"Global Data Management"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-023-00363-x"},{"journal-title":"The B-Method An Introduction","year":"2003","author":"abrial","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45236-2_46"},{"journal-title":"A study in the use of event-b for system development from a software engineering viewpoint","year":"2011","author":"padidar","key":"ref18"},{"key":"ref8","first-page":"57","article-title":"Formalization and verification of kafka messaging mechanism using csp","author":"xu","year":"2022","journal-title":"Computer Science and Information Systems"},{"key":"ref7","first-page":"266","author":"diwan","year":"2017","journal-title":"A framework for modeling and verifying iot communication protocols"},{"key":"ref9","first-page":"35","author":"delzanno","year":"2019","journal-title":"Towards the automated verification of pub-lish\/subscribe networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.09.318"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100538"},{"key":"ref6","first-page":"31","author":"abrial","year":"2018","journal-title":"On b and event-b principles success and challenges"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-023-00202-y"}],"event":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2023,7,9]]},"location":"Gammarth, Tunisia","end":{"date-parts":[[2023,7,12]]}},"container-title":["2023 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10217219\/10217829\/10217842.pdf?arnumber=10217842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T13:50:17Z","timestamp":1695649817000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10217842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscc58397.2023.10217842","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}