1. Alexiou, N., Basagiannis, S., & Petridou, S. (2016). Formal security analysis of near field communication using model checking. Computers & Security, 60, 1–14.
https://doi.org/10.1016/j.cose.2016.03.002
.
2. Alur, R., & Dill, D. L. (1994). A theory of timed automata. Theoretical Computer Science, 126(2), 183–235.
https://doi.org/10.1016/0304-3975(94)90010-8
.
3. Behrmann, G., David, A., & Larsen, K. G. (2006). A tutorial on Uppaal 4.0. Aalborg, Denmark. URL:
http://www.it.uu.se/research/group/darts/papers/texts/new-tutorial.pdf
.
4. Chrobot, S., & Daszczuk, W. B. (2006). Communication dualism in distributed systems with Petri net interpretation. Theoretical and Applied Informatics, 18(4), 261–278. URL:
https://taai.iitis.pl/taai/article/view/250/taai-vol.18-no.4-pp.261
.
5. Cimatti, A., Clarke, E., Giunchiglia, F., & Roveri, M. (2000). NUSMV: A new symbolic model checker. International Journal on Software Tools for Technology Transfer, 2(4), 410–425.
https://doi.org/10.1007/s100090050046
.