{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:33:06Z","timestamp":1730298786675,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/ssci50451.2021.9660106","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:09:51Z","timestamp":1643058591000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations"],"prefix":"10.1109","author":[{"given":"Pengcheng","family":"Jiang","sequence":"first","affiliation":[{"name":"Waseda University,Tokyo,Japan"}]},{"given":"Kenji","family":"Tei","sequence":"additional","affiliation":[{"name":"Waseda University\/ National Institute of Informatics,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref39","article-title":"On lp-norm Robustness of Ensemble Stumps and Trees","author":"wang","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942762"},{"key":"ref32","article-title":"ML+ FV= ?? A Survey on the Application of Machine Learning to Formal Verification","author":"amrani","year":"2018","journal-title":"ArXiv Preprint"},{"journal-title":"Can machine learning automatically choose your best model checking strategy?","year":"2019","author":"hendriks","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-019-00264-4"},{"journal-title":"Bilibili","article-title":"What are B-Coin, Coin or Membership used for?","year":"2018","key":"ref37"},{"journal-title":"GIFT - Send gifts to creators to make videos better (n d ) Niconico","year":"0","key":"ref36"},{"journal-title":"TikTok","article-title":"LIVE gifting","year":"2021","key":"ref35"},{"journal-title":"Support Streamers by Cheering with Bits! (n d ) Twitch","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.06.002"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/940103.940106"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MSP.2004.64","article-title":"Aligning security and usability","volume":"2","author":"yee","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33427-6_21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2891411"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.01.001"},{"key":"ref19","first-page":"235","article-title":"Using human computer interaction principles to promote usable security","author":"katsabas","year":"2005","journal-title":"Proceedings of the Fifth International Network Conference (INC 2005)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2000.855781"},{"journal-title":"From pranks to APTs How remote access Trojans became a major security threat CSO","year":"2020","author":"andrada","key":"ref4"},{"key":"ref27","volume":"10","author":"magee","year":"1999","journal-title":"State models and java programs"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180423"},{"journal-title":"Ltsa - labelled transition system analyser","year":"0","author":"jeff","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568264"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360251"},{"journal-title":"Graphlab Create Fast Scalable Machine Learning Modeling in Python","year":"2018","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3436286.3436322"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref1","first-page":"802","article-title":"A study on customer satisfaction towards online ticket booking for airlines","volume":"9","author":"sanath kumar","year":"2019","journal-title":"Journal of Information and Computational Science"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2018.00019"},{"key":"ref22","first-page":"1","article-title":"Psychological Acceptability Revisited","author":"bishop","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606714"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.12.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1524\/itit.2013.0003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2846741"}],"event":{"name":"2021 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2021,12,5]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2021,12,7]]}},"container-title":["2021 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9659537\/9659538\/09660106.pdf?arnumber=9660106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:58:07Z","timestamp":1659484687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ssci50451.2021.9660106","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}