{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:09Z","timestamp":1750307889854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,19]],"date-time":"2010-05-19T00:00:00Z","timestamp":1274227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,19]]},"DOI":"10.1145\/1822327.1822342","type":"proceedings-article","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T14:35:31Z","timestamp":1279722931000},"page":"108-113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards a self-forensics property in the ASSL toolset"],"prefix":"10.1145","author":[{"given":"Serguei A.","family":"Mokhov","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]},{"given":"Emil","family":"Vassev","sequence":"additional","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]},{"given":"Joey","family":"Paquet","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,5,19]]},"reference":[{"volume-title":"IBM Corporation","year":"2005","author":"D. Agrawal","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"AspectJ Contributors. AspectJ: Crosscutting Objects for Better Modularity. eclipse.org 2007. http:\/\/www.eclipse.org\/aspectj\/.  AspectJ Contributors. AspectJ: Crosscutting Objects for Better Modularity . eclipse.org 2007. http:\/\/www.eclipse.org\/aspectj\/."},{"volume-title":"University of Fribourg","year":"1999","author":"Haenni R.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2010.40"},{"key":"e_1_3_2_1_5_1","first-page":"36","volume-title":"Software Engineering Research and Practice","author":"Hinchey M. G.","year":"2005"},{"key":"e_1_3_2_1_6_1","article-title":"IBM's perspective on the state of information technology. Technical report","author":"Horn P.","year":"2001","journal-title":"IBM T. J. Watson Laboratory"},{"volume-title":"IBM Corporation","year":"2006","author":"IBM Corporation","key":"e_1_3_2_1_7_1"},{"volume-title":"IBM Corporation","year":"2005","author":"Tivoli IBM","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"S. A. Mokhov. Encoding forensic multimedia evidence from MARF applications as Forensic Lucid expressions. In T. Sobh K. Elleithy and A. Mahmood editors Novel Algorithms and Techniques in Telecommunications and Networking proceedings of CISSE'08 pages 413--416 University of Bridgeport CT USA Dec. 2008. Springer. Printed in January 2010.  S. A. Mokhov. Encoding forensic multimedia evidence from MARF applications as Forensic Lucid expressions. In T. Sobh K. Elleithy and A. Mahmood editors Novel Algorithms and Techniques in Telecommunications and Networking proceedings of CISSE'08 pages 413--416 University of Bridgeport CT USA Dec. 2008. Springer. Printed in January 2010.","DOI":"10.1007\/978-90-481-3662-9_71"},{"key":"e_1_3_2_1_11_1","unstructured":"S. A. Mokhov. Enhancing the formal cyberforensic approach with observation modeling with credibility factors and mathematical theory of evidence. {online} also in ;login: vol. 34 no. 6 p. 101 Dec. 2009. Presented at WIPS at USENIX Security'09 http:\/\/www.usenix.org\/events\/sec09\/wips.html.  S. A. Mokhov. Enhancing the formal cyberforensic approach with observation modeling with credibility factors and mathematical theory of evidence. {online} also in ;login: vol. 34 no. 6 p. 101 Dec. 2009. Presented at WIPS at USENIX Security'09 http:\/\/www.usenix.org\/events\/sec09\/wips.html."},{"volume-title":"Proceedings of HSC'09","year":"2009","author":"Mokhov S. A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"S. A. Mokhov. Towards improving validation verification crash investigations and event reconstruction of flight-critical systems with self-forensics. {online} June 2009. A white paper submitted in response to NASA's RFI NNH09ZEA001L http:\/\/arxiv.org\/abs\/0906.1845.  S. A. Mokhov. Towards improving validation verification crash investigations and event reconstruction of flight-critical systems with self-forensics. {online} June 2009. A white paper submitted in response to NASA's RFI NNH09ZEA001L http:\/\/arxiv.org\/abs\/0906.1845."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2010.23"},{"key":"e_1_3_2_1_16_1","first-page":"197","volume-title":"Proceedings of the IT Incident Management and IT Forensics (IMF'08)","author":"Mokhov S. A.","year":"2008"},{"volume-title":"Proceedings of the Huntsville Simulation Conference (HSC'09)","year":"2009","author":"Mokhov S. A.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of the Huntsville Simulation Conference (HSC'09)","year":"2009","author":"Mokhov S. A.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557626.1557642"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557626.1557655"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2009.19"},{"volume-title":"IBM Press","year":"2004","author":"Murch R.","key":"e_1_3_2_1_22_1"},{"volume-title":"DFRWS","year":"2001","author":"G. Palmer","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.137"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.200"},{"volume-title":"Infrastructure and Applications. CRC Press","year":"2006","author":"Parashar M.","key":"e_1_3_2_1_26_1"},{"volume-title":"Princeton University Press","year":"1976","author":"Shafer G.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"ICSOFT 2009 - Proceedings of the 4th International Conference on Software and Data Technologies","volume":"1","author":"Shishkov B.","year":"2009"},{"key":"e_1_3_2_1_29_1","unstructured":"The PRISM Team. PRISM: a probabilistic model checker. {online} 2004--2010. http:\/\/www.prismmodelchecker.org\/ last viewed June 2009.  The PRISM Team. PRISM: a probabilistic model checker. {online} 2004--2010. http:\/\/www.prismmodelchecker.org\/ last viewed June 2009."},{"volume-title":"Concordia University","year":"2008","author":"Tong X.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.66"},{"key":"e_1_3_2_1_32_1","first-page":"3","article-title":"Autonomic System Specification Language - A Framework for Specification and Code Generation of Autonomic Systems","author":"Vassev E.","year":"2009","journal-title":"LAP Lambert Academic Publishing"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.174"},{"volume-title":"Lero - The Irish Software Engineering Research Center","year":"2009","author":"Vassev E.","key":"e_1_3_2_1_34_1"},{"first-page":"163","volume-title":"Shishkov et al. {28}","author":"Vassev E.","key":"e_1_3_2_1_35_1"},{"first-page":"251","volume-title":"Shishkov et al. {28}","author":"Vassev E.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364079"},{"volume-title":"INSTICC Press","year":"2006","author":"Vassev E.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557626.1557645"},{"key":"e_1_3_2_1_40_1","first-page":"331","volume-title":"Proceedings of ICSOFT'09","volume":"1","author":"Vassev E.","year":"2009"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13273-5_1"},{"volume-title":"INSTICC Press","year":"2007","author":"Vassev E.","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/EASe.2008.9"},{"volume-title":"Concordia University","year":"2008","author":"Vassev E. I.","key":"e_1_3_2_1_44_1"},{"volume-title":"Concordia University","year":"2006","author":"Wan K.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2010.29"},{"volume-title":"Concordia University","year":"2009","author":"Wu A. H.","key":"e_1_3_2_1_47_1"}],"event":{"name":"C3S2E '10: C* Conference on Computer Science & Software Engineering","sponsor":["ACM Association for Computing Machinery","BytePress","Concordia University Concordia University"],"location":"Montr\u00e9al Quebec Canada","acronym":"C3S2E '10"},"container-title":["Proceedings of the Third C* Conference on Computer Science and Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1822327.1822342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1822327.1822342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:16Z","timestamp":1750258036000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1822327.1822342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,19]]},"references-count":46,"alternative-id":["10.1145\/1822327.1822342","10.1145\/1822327"],"URL":"https:\/\/doi.org\/10.1145\/1822327.1822342","relation":{},"subject":[],"published":{"date-parts":[[2010,5,19]]},"assertion":[{"value":"2010-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}