Publisher
Springer Science and Business Media LLC
Reference10 articles.
1. DARPA, “Cyber Grand Challenge.” URL: https://www.darpa.mil/program/cyber-grand-challenge.
2. F. Mercaldo, F. Martinelli, and A. Santone, “Real-time SCADA attack detection by means of formal methods,” in: 2019 IEEE 28th Intern. Conf. on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Napoli, Italy (2019), pp. 231–236.https://doi.org/10.1109/WETICE.2019.00057
3. A. A. Letichevsky and J. V. Kapitonova, “Algebraic programming in the APS system,” in: ISSAC’90: Proc. of the Intern. Symp.on Symbolic and Algebraic Computation (Tokyo, Japan, August 20–24, 1990), Association for Computing Machinery, New York (1990), pp. 68–75. https://doi.org/10.1145/96877.96896.
4. A. Letichevsky and D. Gilbert, “A model for interaction of agents and environments,” in: D. Bert, C. Choppy, and P. D. Mosses, (eds.), Recent Trends in Algebraic Development Techniques, WADT 1999, Lecture Notes in Computer Science, Vol. 1827, Springer, Berlin–Heidelberg (2000), pp. 311–328. https://doi.org/10.1007/978-3-540-44616-3_18.
5. A. Letichevsky, O. Letychevskyi, and V. Peschanenko, “Insertion modeling and its applications,” Comput. Sci. J. Mold., Vol. 24, No. 3, 357–370 (2016).