{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:12:36Z","timestamp":1758121956068,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T00:00:00Z","timestamp":1497744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,18]]},"DOI":"10.1145\/3061639.3062271","type":"proceedings-article","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T12:18:42Z","timestamp":1497356322000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Learning to Produce Direct Tests for Security Verification Using Constrained Process Discovery"],"prefix":"10.1145","author":[{"given":"Kuo-Kai","family":"Hsieh","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Li-C.","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Wen","family":"Chen","sequence":"additional","affiliation":[{"name":"NXP Semiconductors, Inc."}]},{"given":"Jayanta","family":"Bhadra","sequence":"additional","affiliation":[{"name":"NXP Semiconductors, Inc."}]}],"member":"320","published-online":{"date-parts":[[2017,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1899721.1899864"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.003"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Dua and X. Du. Data Mining and Machine Learning in Cybersecurity. Auerbach Publications Boston MA USA 1st edition 2011.   S. Dua and X. Du. Data Mining and Machine Learning in Cybersecurity. Auerbach Publications Boston MA USA 1st edition 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"volume-title":"Pearson Education India","year":"1979","author":"Hopcroft J. E.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proc. International Workshop on Constraints in Formal Verification","year":"2007","author":"Klieber W.","key":"e_1_3_2_1_9_1"},{"volume-title":"Springer","year":"2006","author":"Kolter J. Z.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11527695_27"},{"volume-title":"USA","year":"2005","author":"Maloof M. A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2840819.2840868"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"first-page":"313","volume-title":"Proceedings of the conference on Design, Automation & Test in Europe","author":"Subramanyan P.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-008-0106-z"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"W. M. P. van der Aalst. Process Mining: Discovery Conformance and Enhancement of Business Processes. Springer Publishing Company 1st edition 2011.   W. M. P. van der Aalst. Process Mining: Discovery Conformance and Enhancement of Business Processes. Springer Publishing Company 1st edition 2011.","DOI":"10.1007\/978-3-642-19345-3_1"}],"event":{"name":"DAC '17: The 54th Annual Design Automation Conference 2017","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Austin TX USA","acronym":"DAC '17"},"container-title":["Proceedings of the 54th Annual Design Automation Conference 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3062271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3061639.3062271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:26Z","timestamp":1750215806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3062271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,18]]},"references-count":17,"alternative-id":["10.1145\/3061639.3062271","10.1145\/3061639"],"URL":"https:\/\/doi.org\/10.1145\/3061639.3062271","relation":{},"subject":[],"published":{"date-parts":[[2017,6,18]]},"assertion":[{"value":"2017-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}