1. Ahrendt, W., Bubel, R., Ellul, J., Pace, G.J., Pardo, R., Rebiscoul, V., Schneider, G.: Verification of smart contract business logic. In: International Conference on Fundamentals of Software Engineering, pp. 228–243. Springer, Berlin (2019)
2. Bowen, J.P., Butler, R.W., Dill, D.L., Glass, R.L., Gries, D., Hall, A., Hinchey, M.G., Holloway, C.M., Jackson, D., Jones, C.B., Lutz, M.J., Parnas, D.L., Rushby, J.M., Wing, J.M., Zave, P.: An invitation to formal methods. Computer 29(4), 16–30 (1996). https://doi.org/10.1109/MC.1996.488298
3. Cihon, P., Kleinaltenkamp, M.J., Schuett, J., Baum, S.D.: AI certification: advancing ethical practice by reducing information asymmetries. IEEE Trans. Technol. Soc. 2(4), 200–209 (2021)
4. Del Mar, M., Achiaga, N.: The NIS2 Directive: a high common level of cybersecurity in the EU (2022). https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333
5. Dijkstra, E.W.: On the reliability of programs, E.W. Dijkstra Archive: the manuscripts of Edsger W. Dijkstra 1930–2002, EWD 303 (1971). http://www.cs.utexas.edu/users/EWD/ewd03xx/EWD303.PDF