{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:18:16Z","timestamp":1774369096498,"version":"3.50.1"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/mc.2024.3363808","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T17:20:58Z","timestamp":1714670458000},"page":"86-90","source":"Crossref","is-referenced-by-count":2,"title":["Assured Autonomy Through Combinatorial Methods"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0050-1596","authenticated-orcid":false,"given":"D. Richard","family":"Kuhn","sequence":"first","affiliation":[{"name":"Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4934-7331","authenticated-orcid":false,"given":"M. S.","family":"Raunak","sequence":"additional","affiliation":[{"name":"Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-3391","authenticated-orcid":false,"given":"Raghu N.","family":"Kacker","sequence":"additional","affiliation":[{"name":"Applied and Computational Mathematics Division of the Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8694-4296","authenticated-orcid":false,"given":"Jaganmohan","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8263-0521","authenticated-orcid":false,"given":"Erin","family":"Lanus","sequence":"additional","affiliation":[{"name":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9215-5816","authenticated-orcid":false,"given":"Tyler","family":"Cody","sequence":"additional","affiliation":[{"name":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7108-3921","authenticated-orcid":false,"given":"Laura","family":"Freeman","sequence":"additional","affiliation":[{"name":"Commonwealth Cyber Initiative, Arlington, VA, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Software assurance (SwA)","year":"2023"},{"key":"ref2","volume-title":"Software Testing Techniques","author":"Beizer","year":"2003"},{"key":"ref3","first-page":"2","article-title":"Verification and validation of flight critical systems","volume-title":"Proc. 2nd NASA Formal Methods Symp.","author":"Brat"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2016.09.010"},{"key":"ref5","volume-title":"Korean competition shows weather still a challenge for autonomous cars","author":"Ackerman","year":"2014"},{"key":"ref6","volume-title":"A Tragic Loss","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"ref8","volume-title":"A practical tutorial on Modified condition\/decision coverage","author":"Hayhurst","year":"2001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icstw.2013.77"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icstw52544.2021.00025"},{"key":"ref11","volume-title":"Planes in satellite imagery","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.06222021-draft"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10517679\/10517690.pdf?arnumber=10517690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:36:23Z","timestamp":1714761383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10517690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":12,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mc.2024.3363808","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}