共 41 条
[1]
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[2]
Facets of Software Doping
[J].
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II,
2016, 9953
:601-608
[3]
Bezzo N, 2014, IEEE INT C INT ROBOT, P3692, DOI 10.1109/IROS.2014.6943080
[4]
Bonakdarpour B, 2018, LECT NOTES COMPUT SC, V11247, P9, DOI 10.1007/978-3-030-03427-6_2
[5]
Bozkurt A. K., 2020, 2020 IEEE INT C ROB, P10349, DOI DOI 10.1109/ICRA40945.2020.9196796
[6]
Bozkurt Alper Kamil, 2020, ARXIV201001050CSRO
[9]
Chowdhury Abdullahi, 2019, Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, P1426
[10]
CPSL@Duke, 2020, CPSL DUK