Software Formal Verification Research Topics for MS PhD

Software Formal Verification Research Topic ideas for MS, or Ph.D. Degree

I am sharing with you some of the research topics regarding Software Formal Verification that you can choose for your research proposal for the thesis work of MS, or Ph.D. Degree.

  1. A systematic literature review on formal verification of software‐defined networks
  2. Empowering SysML-based software architecture description with formal verification: from SysADL to CSP
  3. A Survey on the Applications of Swarm Intelligence to Software Verification
  4. Formal Verification of a Merge Sort Algorithm in SPARK
  5. Formal analysis and verification of airborne software based on DO-333
  6. Formal Verification Issues For Component-Based Development
  7. kPWorkbench: A software suit for membrane systems
  8. A formal approach to AADL model-based software engineering
  9. Advances in automatic software verification: SV-COMP 2020
  10. Formal Verification of High-Level Synthesis
  11. Formal verification of input-output mappings of tree ensembles
  12. Software verification: 10th comparative evaluation (SV-COMP 2021)
  13. Formal verification of SDN-based firewalls by using TLA+
  14. Are you sure your software will not kill anyone?
  15. FVIL: Intermediate Language Based on Formal Verification Virtual Machine
  16. Natural Hoare Logic: Towards formal verification of programs from logical forms of natural language specifications
  17. Security modelling and formal verification of survivability properties: Application to cyber–physical systems
  18. Formal Verification of Neural Networks?
  19. Using taint analysis and reinforcement learning (tarl) to repair autonomous robot software
  20. Verification of cyberphysical systems
  21. Modeling and Verification of Launch Vehicle Onboard Software Using SPIN Model Checker
  22. A security modeling and verification method of embedded software based on Z and MARTE
  24. Towards automated service-oriented verification of embedded control software modeled in Simulink
  25. Software Engineering and Formal Methods LNCS 12310
  26. Verification and testing of safety-critical airborne systems: A model-based methodology
  27. Continuous Formal Verification of Microservice-Based Process Flows
  28. Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review
  29. Introduction to the minitrack on software development for mobile devices, the internet-of-things, and cyber-physical systems
  30. Formal Verification and Design of Smart Stick for Blind People
  31. Towards Formal Verification of Autonomous Driving Supervisor Functions
  32. A security policy model transformation and verification approach for software defined networking
  33. A systematic map on verification and validation of emergent behavior in software engineering research
  34. Software Verification with PDR: An Implementation of the State of the Art
  35. Improving the formal verification of reachability policies in virtualized networks
  36. Hardware/Software Co-verification Using Path-based Symbolic Execution
  37. Analysis of existing parallel programs verification technologies
  38. Security-Minded Verification of Space Systems
  39. Formal verification of braking while swerving in automobiles
  40. Code-level model checking in the software development workflow
  41. Coco: Co-design and co-verification of masked software implementations on CPUs
  42. Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems
  43. Formal verification of cP systems using PAT3 and ProB
  44. Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems
  45. Towards formal verification of IoT protocols: A review
  46. Formal Verification of Tree Ensembles in Safety-Critical Applications
  47. Formal verification of a hybrid machine learning-based fault prediction model in Internet of Things applications
  48. Simulation-Based and Formal Verification of Domain-Specific Language Model
  49. Bridging the gap between formal verification and schedulability analysis: The case of robotics
  50. Rooting Formal Methods within Higher Education Curricula for Computer Science and Software Engineering–A White Paper
  51. Reductions and abstractions for formal verification of distributed round-based algorithms
  52. A Formal Verification Framework for Security Issues of Blockchain Smart Contracts
  53. Model checking software in cyberphysical systems
  54. Exploring the effects of environmental conditions and design choices on IoT systems using formal methods
  55. Formal Verification of Hardware Components in Critical Systems
  56. Formal Verification of Neural Agents in Non-deterministic Environments.
  57. Formal verification of a task scheduler for embedded operating systems
  58. Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges
  59. Testing and verification of neural-network-based safety-critical control software: A systematic literature review
  60. Formal Verification Tool Evaluation For Unmanned Aircraft Containing Complex Functions
  61. Towards Compositional Verification for Modular Robotic Systems
  62. Formal Verification of an Industrial Distributed Algorithm: an Experience Report
  63. State of the Art in Software Tool Qualification with DO-330: A Survey
  64. Modeling and Formal Verification of Interlocking System Based on UML and HCPN
  65. Scratch-Based User-Friendly Requirements Definition for Formal Verification of Control Systems
  66. Formal Verification of Intelligent Cyber-Physical Systems with the Interactive Theorem Prover KeYmaera X
  67. A hybrid formal verification approach for QoS-aware multi-cloud service composition
  68. Benchmarking software model checkers on automotive code
  69. A Software Fault Tree Analysis Technique for Formal Requirement Specifications of Nuclear Reactor Protection Systems
  70. Formal Verification of a Distributed Algorithm for Task Execution
  71. From testing to formal verification in Haskell
  72. A secure hardware-software solution based on RISC-V, logic locking and microkernel
  73. Software Reliability Growth as an Offshoot of Verification and Validation Process
  74. Formal Verification and Performance Analysis of a Data Exchange Protocol for Connected Vehicles
  75. Attend and Represent: A Novel View on Algorithm Selection for Software Verification
  76. … Formal Methods, Verification and Validation: Verification Principles: 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020 …
  77. Formal verification and model-based testing techniques for validating a blockchain-based healthcare records sharing system
  78. Towards Formal Verification of Program Obfuscation
  79. Accidental Sensitive Data Leaks Prevention via Formal Verification.
  80. Verification of Virtual Machine Architecture in a Hypervisor through Model Checking
  81. Model‐based hypothesis testing of uncertain software systems
  82. Verification of smart contracts: A survey
  83. Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process
  84. Detecting execution anomalies as an oracle for autonomy software robustness
  85. Formal Verification of Astronaut-Rover Teams for Planetary Surface Operations
  86. Simplifying neural networks using formal verification
  87. Formal verification of parallel prefix sum
  88. Formal verification of misbinding attacks on secure device pairing and bootstrapping
  89. A User-Friendly Verification Approach for IEC 61131-3 PLC Programs
  90. Modeling and verifying the topology discovery mechanism of OpenFlow controllers in software-defined networks using process algebra
  91. Detecting semantic bugs in autopilot software by classifying anomalous variables
  92. Formal verification of timed synchronous dataflow graphs using Lustre
  93. {APEX}: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
  94. Dynamic software updating: a systematic mapping study
  95. Abstract Transducers for Software Analysis and Verification
  96. Towards a unified catalog of attributes to guide industry in software testing technique selection
  97. QED at large: A survey of engineering of formally verified software
  98. Masking in fine-grained leakage models: Construction, implementation and verification
  99. Bridging the Gap Between Requirements and Simulink Model Analysis.
  100. On the Verification of Smart Contracts: A Systematic Review
  101. On slicing software product line signatures
  102. A hybrid formal verification system in coq for ensuring the reliability and security of ethereum-based service smart contracts
  103. A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs
  104. A framework for formal verification of behavior trees with linear temporal logic
  105. Towards Model Checking Real-World Software-Defined Networks
  106. Verification of Software Network Functions with No Verification Expertise
  107. Tamarin software–the tool for protocols verification security
  108. An efficient approach to state space management in model checking of complex software systems using machine learning techniques
  109. A Learning Framework for Intelligent Selection of Software Verification Algorithms
  110. Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark
  111. Adaptive middleware in go-a software architecture-based approach
  112. Cloud-Ready Acceleration of Formal Method Techniques for Cyber-Physical Systems
  113. A software architecture for autonomous taxiing of aircraft
  114. Automated Software Verification using Superposition-based Theorem Proving
  115. Mind the gap: robotic mission planning meets software engineering
  116. On Decomposing Formal Verification of CTL-based Properties on IaaS Cloud Environment
  117. Software requirements elicitation, verification, and documentation: an ontology based approach
  118. Verifiable self-aware agent-based autonomous systems
  119. Formal verification of some mutual exclusion
  120. Formal verification of Fischer’s real-time mutual exclusion protocol by the OTS/CafeOBJ method
  121. Statistical model checking for blockchain-based applications
  122. Moderator Factors of Software Security and Performance Verification
  123. Towards Compositional Verification for Modular Robotic Systems
  124. Algorithm selection for software validation based on graph kernels
  125. Formal Verification of Swerving Maneuvers for Car Collision Avoidance
  126. SW-VHDL Co-Verification Environment Using Open Source Tools
  127. Combined software and hardware fault injection vulnerability detection
  128. Formal Verification of Access Control Model for My Health Record System
  129. Formal verification by the book: Error detection and correction codes
  130. Formal Verification of Multi-agent Plans for Vehicle Platooning
  131. Deep Learning & Software Engineering: State of Research and Future Directions
  132. Handling B models in the PERF integrated verification framework: Formalised and certified embedding
  133. A survey on network forwarding in Software-Defined Networking
  134. Verifying OpenJDK’s LinkedList using KeY
  135. A Formal Verification Approach for Detecting Opcode Trojans
  136. Erroneous models in neural networks and their threats for formal verification
  137. Verification of system-wide safety properties of ROS applications
  138. A verified optimizer for quantum circuits
  139. Verification of Programs with Pointers in SPARK
  140. Metastases or benign adrenal lesions in patients with histopathological verification of lung cancer: can CT texture analysis distinguish?
  141. A Parallel Tableau Algorithm for BIG DATA Verification
  142. Formal Verification of Workflow Policies for Smart Contracts in Azure Blockchain
  143. Radiomic features for prostate cancer grade detection through formal verification
  144. Formal Verification of Heuristic Autonomous Intersection Management Using Statistical Model Checking
  145. Dynamic GSPNs: formal definition, transformation towards GSPNs and formal verification
  146. (User-friendly) formal requirements verification in the context of ISO26262
  147. Formal Verification of UML MARTE Specifications Based on a True Concurrency Real Time Model
  148. Verification for Autonomous Underwater Systems
  149. A Reward Based Formal Model for Distributed Software Defined Networks
  150. ROSMonitoring: A Runtime Verification Framework for ROS
  151. Understanding link fabrication attack in software defined network using formal methods
  152. Migration of existing software systems to mobile computing platforms: a systematic mapping study
  153. Toward Modeling and Verification of Uncertainty in Cyber-Physical Systems
  154. A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems
  155. A formal system of axiomatic set theory in Coq
  156. Enabling continuous integration in a formal methods setting
  157. The challenges of theory-software translation
  158. Formal verification of engineering models via extended symbolic transition systems
  159. Security Verification of Industrial Control Systems using Partial Model Checking
  160. Adding a Verification View for an Autonomous Real-Time System Architecture
  161. Formal Verification of Parallel Stream Compaction and Summed-Area Table Algorithms
  162. Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion
  163. NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems
  164. Formal verification of an approach for systematic false positive mitigation in safe automated driving system
  165. Formal Verification of Safety Critical Autonomous Systems via Bayesian Optimization
  166. Alliance of model-driven engineering with a proof-based formal approach
  167. Formal specification and verification of reusable communication models for distributed systems architecture
  168. ChemTest: An Automated Software Testing Framework for an Emerging Paradigm
  169. Towards a Verification-Driven Iterative Development of Cyber-Physical System
  170. Hardware-software contracts for secure speculation
  171. Understanding Practitioners’ challenges on software modeling: A survey
  172. Multiclock Constraint System Modelling and Verification for Ensuring Cooperative Autonomous Driving Safety
  173. Formal analysis of the Schulz matrix inversion algorithm: A paradigm towards computer aided verification of general matrix flow solvers
  174. Experiences from Large-Scale Model Checking: Verification of a Vehicle Control System
  175. Quantum Software Engineering: Landscapes and Horizons
  176. Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
  177. Methods and Tools for Formal Verification of Cloud Sisal Programs
  178. Formal Verification of Arithmetic RTL: Translating Verilog to C++ to ACL2
  179. Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe
  180. A Boolean Control Network Approach to the Formal Verification of Feedback Context-Aware Pervasive Systems
  181. DEv-PROMELA: modeling, verification, and validation of a video game by combining model-checking and simulation
  182. A formal modeling approach for QOS in MQTT protocol
  183. SILVER–Statistical Independence and Leakage Verification
  184. Formal Verification of a Certified Policy Language
  185. Verification and refutation of C programs based on k-induction and invariant inference
  186. Regression verification for automated evaluation of students programs
  187. Formal Verification Applied to Spacecraft Attitude Control
  188. Trustworthy ai
  189. Applying analytical and empirical schedulability analysis techniques to a real spacecraft flight software
  190. Packet Reachability Verification in OpenFlow Networks
  191. Verifying Autonomous Robots: Challenges and Reflections (Invited Talk)
  192. On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks
  193. Formal Verification of the Race Condition Vulnerability in Ladder Programs
  194. Enhanced Virtual Prototyping: Featuring RISC-V Case Studies
  195. End-to-end verification of initial and transition properties of GR (1) designs in SPARK
  196. Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation
  197. Smart, and also Reliable and Gas-Efficient, Contracts
  199. Synthesis of Specifications and Refinement Maps for Real-time Object Code Verification
  200. Building Energy Model for Mexican Energy Standard Verification Using Physics-Based Open Studio SGSAVE Software Simulation
  201. Qualification of hardware description language designs for safety critical applications in nuclear power plants
  202. Intelligent agent for formal modelling of temporal multi-agent systems
  203. Formal Verification of Integer Multiplier Circuits using Algebraic Reasoning-A Survey
  204. Model-based testing of software product lines: Mapping study and research roadmap
  205. Deductive Binary Code Verification Against Source-Code-Level Specifications
  206. A Design and Verification Methodology for a TrustZone Trusted Execution Environment
  207. Formal Verification of Parallel Prefix Sum
  208. Compilation, Optimization and Verification of Near-Term Quantum Computing
  209. Modular regression verification for reactive systems
  210. An educational case study of using sysml and ttool for unmanned aerial vehicles design
  211. From legal agreements to blockchain smart contracts
  212. Beyond SOTIF: Black Swans and Formal Methods
  213. Formal Verification of Divider and Square-root Arithmetic Circuits Using Computer Algebra Methods
  214. On Delay Bounds and Measurements: A COTS Testbed for Network Performance Experimentation
  215. Online Verification through Model Checking of Medical Critical Intelligent Systems
  216. A model-driven approach for the verification of an adaptive service composition
  217. Modular verification of JML contracts using bounded model checking
  218. Designing a demonstrator of formal methods for railways infrastructure managers
  219. Knowledge-Based Verification of Concatenative Programming Patterns Inspired by Natural Language for Resource-Constrained Embedded Devices
  220. Formal modeling and verification of cloud‐based web service composition
  221. Mining assumptions for software components using machine learning
  222. WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants
  223. Policy specification and verification for blockchain and smart contracts in 5G networks
  224. Towards digital twins for the description of automotive software systems
  225. … Through Intelligent Software Methodologies, Tools and Techniques: Proceedings of the 19th International Conference on New Trends in Intelligent Software …
  226. An approach for the transformation and verification of BPMN models to colored petri nets models
  227. Formal Specification and Verification of Solidity Contracts with Events (Short Paper)
  228. Component-Based Software Engineering: Methods and Metrics
  229. Timing of autonomous driving software: Problem analysis and prospects for future solutions
  230. Embedding online runtime verification for fault disambiguation on Robonaut2
  231. Open questions in formal methods
  232. Exhaustive testing of safety-critical software for reactor protection system
  233. The changing nature of computational science software
  234. A Systematic Migration Methodology for Complex Real-time Software Systems
  235. Role of ontology in software testing
  236. A framework for supporting the development of verifiably safe medical best practice guideline systems
  237. Survey on automated symbolic verification and its application for synthesising cyber-physical systems
  238. ERP software inspections and audits
  239. Methods and formal models of intelligent analysis of weakly structured data
  240. SMT-based verification of temporal properties for component-based software systems
  242. Efficient plagiarism detection for software modeling assignments
  243. A framework for assume-guarantee regression verification of evolving software
  244. Concept enforcement and modularization as methods for the ISO 26262 safety argumentation of neural networks
  245. The Decidability of Verification under PS 2.0
  246. Methods for Modeling Urban Road Traffic Using Timed Automata
  247. Modelling and Verification of Cash Withdrawal Transaction in Automated Teller Machine Using Timed Automata
  248. Understanding Software Security from Design to Deployment
  249. Verification of a Failure Management Protocol for Stateful IoT Applications
  250. Elaborating Requirements for Cyber-Physical Systems in Automotive Domain for the Purpose of Their Formal Verification
  251. Verification of Privacy-Enhanced Collaborations
  252. A Cache-Based Model Abstraction and Runtime Verification for the Internet-of-Things Applications
  253. Fundamentals of Software Engineering: Designed to provide an insight into the software engineering concepts
  254. System level formal verification as a service
  255. Incorporating software failure in risk analysis––Part 2: Risk modeling process and case study
  256. Constraint-Based Contract Inference for Deductive Verification
  257. Verification of deep convolutional neural networks using imagestars
  258. Survey on scenario-based safety assessment of automated vehicles
  259. Reinforcement learning with quantitative verification for assured multi-agent policies
  260. Slow denial-of-service attacks on software defined networks
  261. Computational determinacy of cellular automata
  262. Digital Twin for Verification and Validation of Industrial Automation Systems–a Survey
  263. Robust software development for university-built satellites
  264. An Empirical Study of Flight Control System Model Checking Integrated with FMEA
  265. Formal Specification and Verification of UML Class Diagram Refactorings-Based on FGT Paradigm
  266. Status report on software testing: Test-Comp 2021
  267. Incorporating software failure in risk analysis–Part 1: Software functional failure mode classification
  268. Introducing H, an institution-based formal specification and verification language
  269. A Model-Based Approach to the Design, Verification and Deployment of Railway Interlocking System
  270. Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries
  271. Role Based Access Control for Software Defined Networking: Formal Models and Implementation
  272. A Two-Phase Approach for Conditional Floating-Point Verification
  273. Specification and verification of railway safety-critical systems using TLA+: A Case Study
  274. DeepCert: Verification of Contextually Relevant Robustness for Neural Network Image Classifiers
  275. Empirical study of software development life cycle and its various models
  276. An efficient strategy for the development of software test libraries for an automotive microcontroller family
  277. Year IV, Software Quality Assurance and Testing, Effective methods for software testing
  278. A Comparative Study on Transformation of UML/OCL to Other Specifications
  279. Geographical verification of Slovenian milk using stable isotope ratio, multi-element and multivariate modelling approaches
  280. Overview of Formal Methods
  281. A Research on Testing Strategies of OSS Used by Equipment Software
  282. Reludiff: Differential verification of deep neural networks
  283. A System Verilog Approach for Verification of Memory Controller
  284. A Biological-Like Synthesis Framework for Software Engineering Environments
  285. A Case Study in Formal Specification and Runtime Verification of a CubeSat Communications System
  286. Ensuring safety with system level formal modelling
  287. Second Competition on Software Testing: Test-Comp 2020.
  288. TestTDO: A Top-Domain Software Testing Ontology
  289. Uncertainty modeling and runtime verification for autonomous vehicles driving control: A machine learning-based approach
  290. Practical abstractions for automated verification of shared-memory concurrency
  291. Smart Contract modeling and verification techniques: A survey
  292. A Software Security Assessment using OWASP’s Application Security Verification Standard: Results and Experiences from Assessing the DHIS2 Open-Source …
  293. Formal analysis of 5g eap-tls authentication protocol using proverif
  294. Efficiency of using utility for usernames verification in online community management
  295. Using Architectural Runtime Verification for Offline Data Analysis
  296. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities
  297. A systematic literature review on semantic web enabled software testing
  298. … : 23rd International Conference, FOSSACS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin …
  299. A Generalized Formal Semantic Framework for Smart Contracts.
  300. Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX
  301. Incremental Verification of UML/OCL Models
  302. QoS-aware service provisioning in fog computing
  303. Re-Envisioning RCx: Achieving Max Potential HVAC Controls Retrofits through Modernized BAS Hardware and Software
  304. Safety verification of unknown dynamical systems via gaussian process regression
  305. A case study of agile software development for safety-Critical systems projects
  306. The Derivation of Defect Priorities and Core Defects through Impact Relationship Analysis between Embedded Software Defects
  307. Architecture of a Machine Code Deductive Verification System
  308. Approach to the Analysis of Software Requirements Specification on Its Structure Correctness
  309. Cross-level Co-simulation and Verification of an Automatic Transmission Control on Embedded Processor
  310. Digital Age of Consent and Age Verification: Can They Protect Children?
  311. Optimization of automated executions based on integration test configurations of embedded software
  312. A cloud software life cycle process (CSLCP) model
  313. Automated and scalable verification of integer multipliers
  314. Efficient verification of relu-based neural networks via dependency analysis
  315. Empowering Multilevel DSMLs with Integrated Runtime Verification
  316. Heterogeneous verification of an autonomous curiosity rover
  317. The VerifyThis Collaborative Long Term Challenge
  318. No Crash, No Exploit: Automated Verification of Embedded Kernels
  319. Automatically partition software into least privilege components using dynamic data dependency analysis.(2013)
  320. Deciding reachability under persistent x86-TSO
  321. Formal methods for prostate cancer gleason score and treatment prediction using radiomic biomarkers
  322. Silas: A High-Performance Machine Learning Foundation for Logical Reasoning and Verification
  324. … of the implementation of a subset of ISO/IEC 29110 Software Implementation process in four teams of undergraduate students of Ecuador. An empirical software …
  325. Verification Method of Safety Properties of Embedded Assembly Program by Combining SMT-Based Bounded Model Checking and Reduction of Interrupt Handler …
  326. Towards automated verification of smart contract fairness
  327. Methods for Domain Specialization of Verification-Oriented Process Ontologies
  328. Safety Verification of IEC 61131-3 Structured Text Programs
  329. Simple: A remote attestation approach for resource-constrained iot devices
  330. Detecting critical bugs in SMT solvers using blackbox mutational fuzzing
  331. Verification of concurrent HARPO programs using formal verification theory
  332. Comparison of Cloud‐Top Property Retrievals From Advanced Himawari Imager, MODIS, CloudSat/CPR, CALIPSO/CALIOP, and Radiosonde
  333. Bigraph specification of software architecture and evolution analysis in mobile computing environment
  334. A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design Verification
  335. Verification of ML Systems via Reparameterization
  336. Modeling and analysis of an industrial communication protocol in the Gamma framework
  337. A framework for FMI-based co-simulation of human–machine interfaces
  338. A Study of Software Testing: Categories, Levels, Techniques, and Types
  339. Formal model-based assurance cases in Isabelle/SACM: An autonomous underwater vehicle case study
  340. Passlab: A Password Security Tool for the Blue Team
  341. CLARVA: Model-based Residual Verification of Java Programs.
  342. Graph transformation for software engineers: With applications to model-based development and domain-specific language engineering
  343. A survey of model-driven techniques and tools for cyber-physical systems
  344. Software Security Patch Management–A Systematic Literature Review of Challenges, Approaches, Tools and Practices
  345. Testing Software and Systems
  346. A safety framework for critical systems utilising deep neural networks
  347. Feasibility of a Software agent providing a brief Intervention for Self-help to Uplift psychological wellbeing (“SISU”). A single-group pretest-posttest trial …
  348. Multiple fault localization of software programs: A systematic literature review
  349. Using online verification to prevent autonomous vehicles from causing accidents
  350. Correct-by-construction model-based design of reactive streaming software for multi-core embedded systems
  351. Accelerating hardware security verification and vulnerability detection through state space reduction
  352. Model checking for malicious family detection and phylogenetic analysis in mobile environment
  353. Generation of formal requirements from structured natural language
  354. Collaborative filtering based recommendation of sampling methods for software defect prediction
  355. Formal Modeling and Verification of Rate Adaptive Pacemakers for Heart Failure
  356. Test Case Generation Method for Increasing Software Reliability in Safety-Critical Embedded Systems
  357. Documentation of quality requirements in agile software development
  358. Specification and verification in the field: Applying formal methods to {BPF} just-in-time compilers in the Linux kernel
  359. Interface protocol inference to aid understanding legacy software components
  360. Verified Translation Between Purely Functional and Imperative Domain Specific Languages in HELIX
  361. DevOps workflow verification and duration prediction using non‐Markovian stochastic Petri nets
  362. Analyzing and documenting the systematic review results of software testing ontologies
  363. Engineering Management Methods for FPGA Products in the Aviation and the Aerospace Fields
  364. Synchronous Modeling and Verification with the Language Lustre
  365. Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems
  366. Compatibility checking for asynchronously communicating software
  367. On the TOCTOU problem in remote attestation
  368. Runtime Abstract Interpretation for Numerical Accuracy and Robustness
  369. Taxonomical classification of barriers for scaling agile methods in global software development environment using fuzzy analytic hierarchy process
  370. Automated verification of customizable middlebox properties with gravel
  371. Inconsistency-tolerating guidance for software engineering processes
  372. Automatic Verification of LLVM Code
  373. MetaVal: Witness validation via verification
  374. Designing blockchain-based access control protocol in iot-enabled smart-grid system
  375. Automatic analysis of complex interactions in microservice systems
  376. Learning How to Monitor: Pairing Monitoring and Learning for Online System Verification
  377. Strength analysis in regulatory design documents and computational software
  378. Data Flow Verification in SoC Using Formal Techniques
  379. Foundations of Probabilistic Programming
  380. Candidate Software Process Flaws for the Boeing 737 Max MCAS Algorithm and Risks for a Proposed Upgrade
  381. Verification of Patterns
  382. Deductive Verification of Floating-Point Java Programs in KeY
  383. Modeling and verification of running process control for underground mine locomotive
  384. HyDiff: Hybrid differential software analysis
  385. Formal Analysis of a Neural Network Predictor inShared-Control Autonomous Driving
  386. Mutation Testing for Rule-Based Verification of Railway Signaling Data
  387. Exploring factors and measures to select open source software
  388. Software-testing education: A systematic literature mapping
  389. The Move Prover
  390. Modularising Verification Of Durable Opacity
  392. A context‐aware framework for modelling and verification of smart parking systems in urban cities
  393. QPR Verify: A Static Analysis Tool for Embedded Software Based on Bounded Model Checking
  394. Formal Specification of Robotic Architectures for Experimental Robotics
  395. Demystifying the Challenges of Formally Specifying API Properties for Runtime Verification
  396. An Automated Deductive Verification Framework for Circuit-building Quantum Programs
  397. Branch and bound for piecewise linear neural network verification
  398. Open geospatial software and data: A review of the current state and a perspective into the future
  399. Numerical optimization of intake and exhaust structure and experimental verification on single-screw expander for small-scale ORC applications
  400. Coordination artifacts in agile software development
  401. Software process simulation modeling: systematic literature review
  402. A modeling method for systematic architecture reconstruction of microservice-based software systems
  403. The moving target of visualization software for an increasingly complex world
  404. Requirements engineering issues causing software development outsourcing failure
  405. A Requirements Engineering Technology for the IoT Software Systems
  406. Capturing software architecture knowledge for pattern-driven design
  407. Refinement and verification of responsive control systems
  408. Real-time-aware reconfiguration decisions for dynamic software product lines
  409. Coverage-Guided Testing for Scalable Virtual Prototype Verification
  410. Formal requirements elicitation with fret
  411. Formal Non-fragile Verification of Step Response Requirements for Digital State-Feedback Control Systems
  412. Low cost high integrity platform
  413. Formal modelling and verification of a distributed railway interlocking system using UPPAAL
  414. CoqTL: a Coq DSL for rule-based model transformation
  415. Modeling events and events of events in software engineering
  416. Managing software variability for dynamic reconfiguration of robot control systems
  417. Testing Approaches for Web and Mobile Applications: An Overview
  418. Ontology-Based Transformation and Verification of UML Class Model
  419. Recovering variability information from source code of clone-and-own software systems
  420. A survey on the use of access permission-based specifications for program verification
  421. How Can Software Testing be Improved by Analytics to Deliver Better Apps?
  422. Synthesis of Solar Photovoltaic Systems: Optimal Sizing Comparison
  423. Verification of embedded binaries using coverage-guided fuzzing with SystemC-based virtual prototypes
  424. X-by-Construction: Correctness Meets Probability
  425. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
  426. Requirement validation for embedded systems in automotive industry through modeling
  427. GDPR Compliance Verification in Internet of Things
  428. The four dimensions of social network analysis: An overview of research methods, applications, and software tools
  429. Certain trends in uncertainty and sensitivity analysis: An overview of software tools and techniques
  430. Complex Software Testing Analysis using International Standards
  431. Modular answer set programming as a formal specification language
  432. Bitcoin Trace-Net: Formal Contract Verification at Signing Time
  433. Boundary Value Exploration for Software Analysis
  434. Toward Operational Safety Verification Via Hybrid Automata Mining Using I/O Traces of AI-Enabled CPS.
  435. The Implementation of Software Measurement Programs in Medium and Small Projects: A Systematic Literature Review
  436. Mercury accumulation in tree rings: observed trends in quantity and isotopic composition in Shenandoah National Park, Virginia
  437. Sustainability in Software Engineering Education: a case of general professional competencies
  438. Testing relative to usage scope: Revisiting software coverage criteria
  439. Modeling and verification of CTCS-3 level code sequence verification scene based on UPPAAL
  440. A hybrid service selection and composition model for cloud-edge computing in the internet of things
  441. Probabilistic approximation of runtime quantitative verification in self-adaptive systems
  442. MOZART: Design and deployment of advanced IoT applications
  443. Automata-based Formal Analysis and Verification of the Real-Time Linux Kernel
  444. Empirical research on the application of a structure-based software reliability model
  445. Defining and verifying durable opacity: correctness for persistent software transactional memory
  446. Writing Robotics Applications with X-Klaim
  447. Meshing agile and plan-driven development in safety-critical software: a case study
  448. Accurate Smart Contract Verification Through Direct Modelling
  449. A Tutorial on Verifying LinkedList Using KeY
  450. A survey on methods for the safety assurance of machine learning based systems
  451. Performance Verification of Programmable Data Planes at the End-Host
  452. Current trends in flow cytometry automated data analysis software
  453. Reliable Decision-Making in Autonomous Vehicles
  454. Formal Modelling & Verification of E-NIC Issuing System Via Colored Petri Nets (CPN)
  455. Model checking intelligent avionics systems for test cases generation using multi-agent systems
  456. Model checking reveals design issues leading to spurious actuation of nuclear instrumentation and control systems
  457. An abstraction-based framework for neural network verification
  458. Software Requirement in Iterative SDLC Model
  459. A Rule-Based Language and Verification Framework of Dynamic Service Composition
  460. Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
  461. Formal analysis of the compact position reporting algorithm
  462. Risk management in the software life cycle: A systematic literature review
  463. Symmetric Modeling of Communication Effectiveness and Satisfaction for Communication Software on Job Performance
  464. Learning From Families: Inferring Behavioral Variability From Software Product Lines
  465. Usage of Psychophysiological Data as an Improvement in the Context of Software Engineering: A Systematic Mapping Study
  466. CABEAN: a software for the control of asynchronous Boolean networks
  467. Rigorous engineering of collective adaptive systems
  468. TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies
  469. Understanding collaborative software development: An interview study
  470. On reliability assessment when a software-based system is replaced by a thought-to-be-better one
  471. Mining component-based software behavioral models using dynamic analysis
  472. Enhancing scratch damage resistance of PMMA via layer assembly with PVDF: Numerical modeling prediction and experimental verification
  473. Using hypersafety verification for proving correctness of programming assignments
  474. fault: A Python Embedded Domain-Specific Language for Metaprogramming Portable Hardware Verification Components
  475. Inferring performance from code: a review
  476. Systematic literature review and empirical investigation of motivators for requirements change management process in global software development
  477. Random stimuli generation for the verification of quantum circuits
  478. Modeling Injection Molding of High-Density Polyethylene with Crystallization in Open-Source Software
  479. Tendermint blockchain synchronization: formal specification and model checking
  480. Run-Time Assurance for Learning-Enabled Systems
  481. Case study: verifying the safety of an autonomous racing car with a neural network controller
  482. Verification and Synthesis of Information Flow Secure Hardware Designs
  483. Automated Quantification of Immunohistochemical Staining of Large Animal Brain Tissue Using QuPath Software
  484. Monte Carlo Based Statistical Model Checking of Cyber-Physical Systems: A Review
  485. Formal semantics of predictable pipelines: a comparative study
  486. Research Software Engineering
  487. A mobile application for self-guided study of formal reasoning
  488. Freelancers in the Software Development Process: A Systematic Mapping Study
  489. An Introduction to Self-adaptive Systems: A Contemporary Software Engineering Perspective
  490. A Survey of Smart Contract Formal Specification and Verification
  491. The Effects of Static Analysis for Dynamic Software Updating: An Exploratory Study
  492. Evaluating and strategizing the onboarding of software developers in large-scale globally distributed projects
  493. Early Synthesis of Timing Models in AUTOSAR-based Automotive Embedded Software Systems.
  494. Secure software leasing
  495. FPGA-Based Hardware/Software Co-Design of a Bio-Inspired SAT Solver
  496. Certified machine-learning models
  497. Statistical model checking of approximate circuits: challenges and opportunities
  498. Hoare-Style Logic for Unstructured Programs
  499. Collaborative learning-based industrial IoT API recommendation for software-defined devices: The implicit knowledge discovery perspective
  500. Conflict as software levels diversify: Tactical elimination or strategic transformation of practice?
  501. Perfectly parallel fairness certification of neural networks
  502. Empirical studies on software traceability: A mapping study
  503. Researches on Software Requirements Elicitation Approach of the Aviation Electronics Systems based on Multi-ontology
  504. A verification framework for spatio-temporal consistency language with CCSL as a specification language
  505. Software defect prediction using heterogeneous ensemble classification based on segmented patterns
  506. Specification and Verification of the Zab Protocol with TLA+
  507. How bugs are born: a model to identify how bugs are introduced in software components
  508. MSL: A pattern language for engineering self-adaptive systems
  509. A Software Analysis Based Vulnerability Detection System For Smart Contracts
  510. A Process Model for Component-Based Model-Driven Software Development
  511. An evidence-based inquiry into the use of grey literature in software engineering
  512. 密码产品的侧信道分析与评估
  513. The current practices of changing secure software: an empirical study
  514. Verifying replicated data types with typeclass refinements in Liquid Haskell
  515. Formal Framework for Safety, Security, and Availability of Aircraft Communication Networks
  516. Social Network Analysis in Software Development Projects: A Systematic Literature Review
  517. Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph Theory
  518. Interoperability and integration testing methods for IoT systems: A systematic mapping study
  519. Interrupt nesting method based on time slice in embedded software
  520. A robust software watermarking framework using shellcode
  521. An optimized and unique methodology for software test case automation strategy
  522. Smart routing: Towards proactive fault handling of software-defined networks
  523. Experimental Assessment of Friction Coefficient in Deep Drawing and Its Verification by Numerical Simulation
  524. Hardware penetration testing knocks your SoCs off
  525. Hardware private circuits: From trivial composition to full verification
  526. VerifyThis 2019: A Program Verification Competition
  527. Runtime verification of real-time event streams under non-synchronized arrival
  528. Secure over-the-air software updates in connected vehicles: A survey
  529. Integrating runtime verification into an automated uas traffic management system
  530. Software Engineering at Google: Lessons Learned from Programming Over Time
  531. Program transformations enable verification tools to solve interactive fiction games
  532. Using model checking to identify timing interferences on multicore processors
  533. Behavioral simulation for smart contracts
  534. A Cost-Efficient Software Based Router and Traffic Generator for Simulation and Testing of IP Network
  535. Twin-finder: Integrated reasoning engine for pointer-related code clone detection
  536. Software Engineering Practice: A Case Study Approach
  537. A Pattern-Based Formal Modelling Framework for Wireless Sensor Networks
  538. A system concept representation framework and its testing on patents, urban architectural patterns, and software patterns
  539. A systematic literature review of modern software visualization
  540. Together We Are Stronger: Evidence-Based Reflections on Industry-Academia Collaboration in Software Testing
  541. Towards a reference process for software architecture reconstruction
  542. SDLV: Verification of Steering Angle Safety for Self-Driving Cars
  543. The Journal of Systems & Software
  544. Mutation Operators for Decision Table-Based Contracts Used in Software Testing
  545. Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks
  546. The root cause analysis algorithm design incorporated with analytic hierarchy process for software application error
  547. Transcriptome analysis of fetal rat testis following intrauterine exposure to the azole fungicides triticonazole and flusilazole reveals subtle changes despite …
  548. Improving software bug-specific named entity recognition with deep neural network
  549. Software product line applied to the internet of things: A systematic literature review
  550. Combining Fault Analysis Technologies for ISO26262 Functional Safety Verification
  551. Safety Verification of a Data-driven Adaptive Cruise Controller
  552. Quantum Software Testing.
  553. An Interface Theory for Program Verification
  554. Igloo: soundly linking compositional refinement and separation logic for distributed system verification
  555. Reliability of Kinovea® software and agreement with a three-dimensional motion system for gait analysis in healthy subjects
  556. Secure attribute-based search in RFID-based inventory control systems
  557. The development of a next-generation human reliability analysis: Systems analysis for formal pharmaceutical human reliability (SAFPH)
  558. Specification and automated verification of atomic concurrent real-time transactions
  559. A Systematic Investigation of State-of-the-Art SystemC Verification
  560. Verification artifacts in cooperative verification: Survey and unifying component framework
  561. Tornado: Automatic generation of probing-secure masked bitsliced implementations
  562. Model-driven environment for configuration control and deployment of on-board satellite software
  563. Variable Domain-specific Software Languages with DjDSL
  564. Software engineering for artificial intelligence and machine learning software: A systematic literature review
  565. Making software measurement standards understandable
  566. Symbolic verification of message passing interface programs
  567. A maude-based rewriting approach to model and verify cloud/fog self-adaptation and orchestration
  568. A systematic literature review on federated machine learning: From a software engineering perspective
  569. Software and reversible systems: a survey of recent activities
  570. A comprehensive security assessment framework for software-defined networks
  571. Recursive data structures in SPARK
  572. Application of green solvent to separate the minimum boiling point azeotrope based on molecular structure prediction and experimental verification
  573. Falsification of cyber-physical systems with robustness-guided black-box checking
  574. A formal approach to the engineering of domain-specific distributed systems
  575. Specification and Verification of a Transient Data Structure Research internship proposal, M2
  576. Synthesizing barrier certificates using neural networks
  577. Understanding and discovering software configuration dependencies in cloud and datacenter systems
  578. Coastal Management Software to Support the Decision-Makers to Mitigate Coastal Erosion
  579. Approximation-refinement testing of compute-intensive cyber-physical models: An approach based on system identification
  580. Automatic software refactoring: a systematic literature review
  581. Verification of neural network behaviour: Formal guarantees for power system applications
  582. … With Single-Isocenter Radiosurgery to Target Multiple Brain Metastases Using an Automated Treatment Planning Software: Clinical Outcomes and Optimal …
  583. Bridging the Gap between Design and Verification of Embedded Systems in Model Based System Engineering: A Meta-model for Modeling Universal Verification …
  584. Development of Secure Software with GRaViTY
  585. Deductive Verification of Floating-Point Java Programs in KeY
  586. Learning concise models from long execution traces
  587. Delta-oriented development of model-based software product lines with DeltaEcore and SiPL: A comparison
  588. Towards an Architecture for Trusted Edge IoT Security Gateways
  589. A sustainable software testing process for the Square Kilometre Array project
  590. A new algorithm on application of blockchain technology in live stream video transmissions and telecommunications
  591. Software quality analysis based on cost and error using fuzzy combined COCOMO model
  592. Hierarchical Formal Modeling of Internet of Things System Oriented to User Behavior
  593. Online Verification Concept for Autonomous Vehicles–Illustrative Study for a Trajectory Planning Module
  594. Evaluating verification awareness as a method for assessing adaptation risk
  595. The μ-Calculus Model-Checking Algorithm for Generalized Possibilistic Decision Process
  596. CoCoSim, a code generation framework for control/command applications An overview of CoCoSim for multi-periodic discrete Simulink models
  597. Integrating security and privacy in software development
  598. Assessing software defection prediction performance: Why using the Matthews correlation coefficient matters
  599. LAKS-NVT: Provably secure and lightweight Authentication and key agreement scheme without verification table in medical internet of things
  600. Towards an FDIR Software Fault Tree Library for Onboard Computers
  601. Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme
  602. The impact of mathematical modeling languages on model quality in systems biology: A software engineering perspective
  603. Verification of Control Sequences within OpenBuildingControl
  604. Optimal design of high-strength water-soluble sand core for investment casting system: Thermodynamic analysis and experimental verification
  605. Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures
  606. Ex-man component model for component-based software construction
  607. Verifying x86 instruction implementations
  608. Leveraging Compiler Intermediate Representation for Multi-and Cross-Language Verification
  609. IT Security for Measuring Instruments: Confidential Checking of Software Functionality
  610. Robustness verification of soft security systems
  611. Opportunistic intermittent control with safety guarantees for autonomous systems
  612. Interval change-point detection for runtime probabilistic model checking
  613. Validation of image-based neural network controllers through adaptive stress testing
  614. Graph Transformation
  615. Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
  616. Accelerating robustness verification of deep neural networks guided by target labels
  617. Specifying the Design Science Research Process: An Applied Case of Building a Software Testing Ontology
  618. Colluding android apps detection via model checking
  619. Automated simulation and verification of process models discovered by process mining
  620. Reachability analysis for hybrid systems with nonlinear guard sets
  621. Minimal Modifications of Deep Neural Networks using Verification.
  622. Verified sequential malloc/free
  623. Synthesizing environment invariants for modular hardware verification
  624. Discovery and quality evaluation of software component behavioral models
  625. Model checking smart contracts for ethereum
  626. Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems
  627. Toward comprehensive network verification: Practices, challenges and beyond
  628. Violation witnesses and result validation for multi-threaded programs
  629. Automatic test case and test oracle generation based on functional scenarios in formal specifications for conformance testing
  630. ClassifyMe: a field-scouting software for the identification of wildlife in camera trap images
  631. ACADF: ant colony unified with adaptive dragonfly algorithm enabled with fitness function for model transformation
  632. Formal analysis and verification of interactions in the O2N middleware framework
  633. A review of the application of component-based software development in open CNC systems
  634. Search-based software engineering for self-adaptive systems: One survey, five disappointments and six opportunities
  635. Impact of Security Measures on Performance Aspects in SysML Models.
  636. CSim2 Compositional Top-down Verification of Concurrent Systems using Rely-Guarantee
  637. PyMTL3: a Python framework for open-source hardware modeling, generation, simulation, and verification
  638. HybridTiger: Hybrid model checking and domination-based partitioning for efficient multi-goal test-suite generation (competition contribution)
  639. An approach to industrial automation based on low-cost embedded platforms and open software
  640. Modeling Software Requirements
  641. Spider: Enabling fast patch propagation in related software repositories
  642. Simultaneous analysis of polyethylene glycol in dietary supplement tablets using high-performance liquid chromatography and verification with liquid chromatography …
  643. Relational Test Tables: A Practical Specification Language for Evolution and Security
  644. A new algorithm for implementing message authentication and integrity in software implementations
  645. Automated verification and synthesis of stochastic hybrid systems: A survey
  646. Verification runtime analysis: get the most out of partial verification
  647. Towards automatic hardware synthesis from formal specification to implementation
  648. Abstract Contract Synthesis and Verification in the Symbolic 𝕂 Framework
  649. The first twenty-five years of industrial use of the B-method
  650. Formal Modeling and Analysis of Probabilistic Real-Time Systems
  651. Domain-specific scenarios for refinement-based methods
  652. The Future of Security Validation and Verification
  653. The evolution of empirical methods in software engineering
  654. Software as a profession
  655. A multimodal-Siamese Neural Network (mSNN) for person verification using signatures and EEG
  656. Plankton: Scalable network configuration verification through model checking
  657. What support do systematic reviews provide for evidence-informed teaching about software engineering practice?
  658. ModCon: a model-based testing platform for smart contracts
  659. Chaining model transformations for system model verification: application to verify capella model with simulink
  660. Incongruence of grammatical subjects activates brain regions involved in perspective taking in a sentence-sentence verification task
  661. Combining Static and Dynamic Program Analysis Techniques for Checking Relational Properties
  662. Towards dynamic dependable systems through evidence-based continuous certification
  663. A software maintenance-focused process and supporting toolset for academic environments
  664. Deep Learning in Software Engineering
  665. Utilizing automatic query reformulations as genetic operations to improve feature location in software models
  666. Property-Directed Verification of Recurrent Neural Networks
  667. Verification Methodology for Computational Wind Engineering Prediction of Wind Loads on Structures
  668. Input validation for neural networks via runtime local robustness verification
  669. Verification of attenuation models based on strong ground motion data in Northern Thailand
  670. High-Level Implementation-Independent Functional Software-Based Self-Test for RISC Processors
  671. An Efficient Floating-Point Bit-Blasting API for Verifying C Programs
  672. Cobomarsen, an oligonucleotide inhibitor of miR-155, slows DLBCL tumor cell growth in vitro and in vivo
  673. Give inconsistency a chance: Semantics for ontology-mediated verification
  674. Model Checking a Distributed Interlocking System Using k-induction with RT-Tester
  675. Formalizing UML/OCL structural features with FoCaLiZe
  676. Formal reasoning under cached address translation
  677. Teaching Accessibility to Software Engineering Students
  678. A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks
  679. Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity
  680. Formal Methods and Computing Identity-based Mentorship for Early Stage Researchers
  681. Ontology-based requirement verification for complex systems
  682. Verified development and deployment of multiple interacting smart contracts with VeriSolid
  683. A natural language processing (NLP) framework for embedded systems to automatically extract verification aspects from textual design requirements
  684. Pragmatic reuse for DSML development
  685. Control-flow flattening preserves the constant-time policy (extended version)
  686. Software fault tolerance for cyber-physical systems via full system restart
  687. Formal analysis of the biological circuits using higher-order-logic theorem proving
  688. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry
  689. More Accurate Dynamic Slicing for Better Supporting Software Debugging
  690. Systematic model-based design assurance and property-based fault injection for safety critical digital systems
  691. Adapting requirements models to varying environments
  692. FCM: a component-based platform with explicit support of crosscutting and dynamic features
  693. Execution-Guided Overapproximation (EGO) for Improving Scalability of Neural Network Verification
  694. Formal synthesis of lyapunov neural networks
  695. Law and software agents: Are they “Agents” by the way?
  696. Specification of synchronous network flooding in temporal logic
  697. A Theory of Value for Value-based Feature Selection in Software Engineering
  698. A qualitative study of the background, skill acquisition, and learning preferences of software testers
  699. Intelligent Software Mining with Business Intelligence Tools for Automation of Micro services in SOA: A Use Case for Analytics
  700. Impacts of process audit review and control efforts on software project outcomes
  701. Effective control of SARS-CoV-2 transmission between healthcare workers during a period of diminished community prevalence of COVID-19
  702. Static verification for Snap!
  703. Being correct is not enough: efficient verification using robust linear temporal logic
  704. WhylSon: Proving your Michelson Smart Contracts in Why3
  705. Flight Test Validation of a Safety-Critical Neural Network Based Longitudinal Controller for a Fixed-Wing UAS
  706. Propagation of the Pearcey Gaussian beams in a medium with a parabolic refractive index
  707. Formal Analysis and Redesign of a Neural Network-Based Aircraft Taxiing System with VerifAI
  708. A reallocation approach for software trustworthiness based on trustworthy attributes
  709. Combining SLiVER with CADP to analyze multi-agent systems
  710. Proving quantum programs correct
  711. Leveraging systematic functional analysis to benchmark an in silico framework distinguishes driver from passenger MEK mutants in cancer
  712. COTS-Based Architectural Framework for Reliable Real-Time Control Applications in Manufacturing
  713. How we refactor and how we document it? On the use of supervised machine learning algorithms to classify refactoring documentation
  714. Efficient verified (UN) SAT certificate checking
  715. Formal reasoning on knowledge and commitments in multi-agent systems using Theatre
  716. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems
  717. ARMv8-A system semantics: instruction fetch in relaxed architectures
  718. A novel three-factor authentication protocol for wireless sensor networks with IoT notion
  719. What Leads to a Confirmatory or Disconfirmatory Behaviour of Software Testers?
  720. Comprehensive analysis of heat transfer of double-skin facades integrated high concentration photovoltaic (CPV-DSF)
  721. Students’ Outcomes in MATLAB Software Programming Project-Oriented Agile Course
  722. Test framework and key challenges for virtual verification of automated vehicles: the VeriCAV project
  723. Correctness enhancement: a pervasive software engineering paradigm
  724. PRISM-games 3.0: Stochastic game verification with concurrency, equilibria and time
  725. A general approach to conflict detection in software-defined networks
  726. Optimized in-network authentication against pollution attacks in software-defined-named data networking
  727. Scaling to Meet the Online Demand in Software Engineering
  728. Performance evaluation of equivalent forwarding sets in software defined networking
  729. Automated temporal verification of integrated dependent effects
  730. Verification of tree induced suction with numerical model
  731. Formalizing and Guaranteeing* Human-Robot Interaction
  732. Accuracy verification of spatio-temporal and kinematic parameters for gait using inertial measurement unit system
  733. CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples
  734. Conformance verification for neural network models of glucose-insulin dynamics
  735. From Domain-Specific Language to Code: Smart Contracts and the Application of Design Patterns
  736. Automating Verification of State Machines with Reactive Designs and Isabelle/UTP
  737. The Relational Method with Message Anonymity for the Verification of Cryptographic Protocols
  738. … nitrogen plus methane (CO2+ N2+ CH4) system: Measurements of vapor-liquid equilibrium data at temperatures from 223 to 298 K and verification of EOS-CG …
  739. Nuclear analysis of the Water cooled lithium lead DEMO reactor
  740. A Taxonomy of Techniques for SLO Failure Prediction in Software Systems
  741. How to evaluate solutions in Pareto-based search-based software engineering? A critical review and methodological guidance
  742. Theoretical modelling and experimental verification of modal responses of skewed laminated sandwich structure with epoxy-filled softcore
  743. Continuous development and testing of access and usage control: a systematic literature review
  744. Who Carries the Burden of Modularity?
  745. Incremental verification of physical access control systems
  746. A software deep packet inspection system for network traffic analysis and anomaly detection
  747. Adapting Teaching of a Software Engineering Service Course Due to COVID-19
  748. A conservative confidence bound for the probability of failure on demand of a software-based system based on failure-free tests of its components
  749. Adding concurrency to a sequential refinement tower
  750. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment
  751. Nonlinear tribo-dynamic model and experimental verification of a spur gear drive under loss-of-lubrication condition
  752. Multilanguage-handwriting self-powered recognition based on triboelectric nanogenerator enabled machine learning
  753. New foundations of ethical multiagent systems
  754. Computational Verification of Large Logical Models—Application to the Prediction of T Cell Response to Checkpoint Inhibitors
  755. Towards runtime verification of programmable switches
  756. Software engineering
  757. LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of drone environment
  758. Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based
  759. Heat Transfer Coefficient Determination during FC-72 Flow in a Minichannel Heat Sink Using the Trefftz Functions and ADINA Software
  760. Partially observable Markov decision process to generate policies in software defect management
  761. Adversarial machine learning-industry perspectives
  762. Automated Repair of Heap-Manipulating Programs Using Deductive Synthesis
  763. Scalable analysis of interaction threats in iot systems
  764. Incremental reasoning in probabilistic signal temporal logic
  765. A rewriting logic-based semantics and analysis of UML activity diagrams: a graph transformation approach
  766. The Impact of Anonymous Peripheral Contributions on Open Source Software Development
  767. Verification of Eventual Consensus in Synod Using a Failure-Aware Actor Model
  768. A formal model of the kubernetes container framework
  769. A framework for verifying deadlock and nondeterminism in UML activity diagrams based on CSP
  770. Operational Safety Verification of AI-Enabled Cyber-Physical Systems
  771. An SMT Theory of Fixed-Point Arithmetic
  772. A component-based framework for certification of components in a cloud of HPC services
  773. Software Effort Estimation for Successful Software Application Development
  774. Automated Symbolic Verification of Telegram’s MTProto 2.0
  775. The 2020 expert survey on formal methods
  776. A corroborative approach to verification and validation of human–robot teams
  777. Verify: a toolbox for deterministic verification of computational models
  778. Generating Certification Evidence for Autonomous Aerial Vehicles Decision-Making
  779. Tool Supported Specification and Verification of Highly Available Applications
  780. A rigorous user needs experience evaluation method based on software quality standards
  781. Connection models for the Internet-of-Things
  782. Formal scenario-based testing of autonomous vehicles: From simulation to the real world
  783. NetSMC: A custom symbolic model checker for stateful network verification
  784. Synthesis and verification of models using satisfiability modulo theories
  785. Verification of Quantitative Hyperproperties Using Trace Enumeration Relations
  786. Improving fuel cell performance via optimal parameters identification through fuzzy logic based-modeling and optimization
  787. Model-agnostic counterfactual explanations for consequential decisions
  788. Investigating the relationship between personalities and agile team climate of software professionals in a telecom company
  789. Formal Algebraic Description of a Fog/IoT Computing Environment
  790. MVC-3DC: Software architecture model for designing collaborative augmented reality and virtual reality systems
  791. Verification of the technical equipment degradation method using a hybrid reinforcement learning trees–artificial neural network system
  792. Effective System Level Liveness Verification
  793. Verification of approximate opacity via barrier certificates
  794. Efficient system verification with multiple weakly-hard constraints for runtime monitoring
  795. Health economics-based verification of functional myocardial ischemia evaluation of stable coronary artery disease in Japan: A long-term longitudinal study …
  796. Short-time speaker verification with different speaking style utterances
  797. Crowbar: Behavioral Symbolic Execution for Deductive Verification of Active Objects
  798. Requirements Engineering in the Context of Big Data Software Applications
  799. A lightweight and secure group key based handover authentication protocol for the software-defined space information network
  800. A content analysis-based approach to explore simulation verification and identify its current challenges
  801. Timing predictability and security in safety-critical industrial cyber-physical systems: A position paper
  802. A simplified and fast computing photovoltaic model for string simulation under partial shading condition
  803. A unified model-based framework for the simplified execution of static and dynamic assertion-based verification
  804. A software-based calibration approach to increase the robustness of embedded systems
  805. Property-based Testing of Quantum Programs in Q#
  806. FTLink: Efficient and flexible link fault tolerance scheme for data plane in Software-Defined Networking
  807. Preliminary verification of lncRNA ENST00000609755. 1 potential ceRNA regulatory network in coronary heart disease
  808. Toward safe and efficient reconfiguration with Concerto
  809. A survey on service composition languages
  810. Laser-assisted fabrication and in vitro verification of functionalized surface for cells biointegration
  811. Formal analysis of QUIC handshake protocol using ProVerif
  812. Non-destructive dose verification of two drugs within 3D printed polyprintlets
  813. Trace-checking signal-based temporal properties: A model-driven approach
  814. Understanding the QuickXPlain algorithm: Simple explanation and formal proof
  815. Verification and validation of openInjMoldSim, an open-Source solver to model the filling stage of thermoplastic injection molding
  816. Unifying semantic foundations for automated verification tools in Isabelle/UTP
  817. hpnmg: A C++ Tool for Model Checking Hybrid Petri Nets with General Transitions
  818. Development and validation of a gene signature classifier for consensus molecular subtyping of colorectal carcinoma in a CLIA-certified setting
  819. SLEMI: Equivalence modulo input (EMI) based mutation of CPS models for finding compiler bugs in Simulink
  820. Intertidal wetland vegetation dynamics under rising sea levels
  821. Verx: Safety verification of smart contracts
  822. Modelling of Language Syntax and Semantics: The Case of the Assembler Compiler
  823. Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol
  824. How do you architect your robots? State of the practice and guidelines for ROS-based systems
  825. Saw: A tool for safety analysis of weakly-hard systems
  826. The application of artificial intelligence in software engineering: a review challenging conventional wisdom
  827. Formal modeling and analysis of medical systems
  828. Numerical investigation on stress intensity around Bone-Implant interface by 3-Dimensional FEA and experimental verification by optical technique
  829. Paper B Design, Control, and Analysis of Nonlinear Circuits with Tunnel Diode with Piecewise Affine Dynamics
  830. Testing and analysis of steady-state helicon plasma source for the Material Plasma Exposure eXperiment (MPEX)
  831. A study on challenges of testing robotic systems
  832. Machine Learning and Statistical Verification for Security
  833. A Vector processing unit implementation for RISC-V vector extension: Functional verification and assertions on submodules
  834. ct-fuzz: Fuzzing for Timing Leaks
  835. Co-simulation of bio-inspired multi-agent algorithms
  836. Tailorability-focused recommendations for United States Air Force software acquisition policy
  837. Functional safety verification of train control procedure in train-centric CBTC by colored Petri net
  838. Crop growth, hydrology, and water quality dynamics in agricultural fields across the Western Lake Erie Basin: Multi-site verification of the Nutrient Tracking Tool (NTT)
  839. Advances in verification of ReLU neural networks
  840. Towards faster reasoners by using transparent huge pages
  841. Step-wise development of provably correct actor systems
  842. Real-Time Verification of Network Properties Based on Header Space
  843. A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
  844. Secure system virtualization: End-to-end verification of memory isolation
  845. Modeling and Verification of Hospital Intelligent Diagnosis and Treatment Service Based on Timed Automata in Internet of Things
  846. Business process specification, verification, and deployment in a mono-cloud, multi-edge context
  847. hW-inference: A heuristic approach to retrieve models through black box testing
  848. A method for proving unlinkability of stateful protocols
  849. TotemBioNet Enrichment Methodology: Application to the Qualitative Regulatory Network of the Cell Metabolism
  850. SoK: Computer-aided cryptography
  851. Nektar++: Design and implementation of an implicit, spectral/hp element, compressible flow solver using a Jacobian-free Newton Krylov approach
  852. Developing accurate and scalable simulators of production workflow management systems with wrench
  853. Interpretation-based violation witness validation for C: NitWit
  854. Automatically testing string solvers
  855. Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic.
  856. A survey of algorithms for black-box safety validation
  857. Programming language foundations in Agda
  858. Can determinism and compositionality coexist in RML?(extended version)
  859. A lightweight three-factor authentication protocol for digital rights management system
  860. β”needle-shape precipitate formation in Al-Mg-Si alloy: Phase field simulation and experimental verification
  861. Process Performance Verification Using Viability Theory. Processes 2021, 9, 482
  862. Reducing commutativity verification to reachability with differencing abstractions
  863. Internet of things (IoT)-enabled elderly fall verification, exploiting temporal inference models in smart homes
  864. So near and yet so far-Symbolic verification of distance-bounding protocols
  865. Theory and experimental verification of a resultant response-based method for assessing the critical seismic excitation direction of curved bridges
  866. Reachable set estimation for neural network control systems: A simulation-guided approach
  867. Verification of Fractional Vegetation Coverage and NDVI of Desert Vegetation via UAVRS Technology
  868. Neutron dosimetry and shielding verification in commissioning of Compact Proton Therapy Centers (CPTC) using MCNP6. 2 Monte Carlo code
  869. Verifying SysML activity diagrams using formal transformation to Petri nets
  870. PaRoT: a practical framework for robust deep neural network training
  871. Novel metaheuristic-based tuning of PID controllers for seismic structures and verification of robustness
  872. Is Artificial Intelligence Ready for Standardization?
  873. Automated optimal firewall orchestration and configuration in virtualized networks
  874. Ivy: a multi-modal verification tool for distributed algorithms
  875. AMYTISS: Parallelized Automated Controller Synthesis for Large-Scale Stochastic Systems
  876. How many bits does it take to quantize your neural network?
  877. Semantic Approach to Smart Contract Verification
  878. Executable cancer models: successes and challenges
  879. Dynamic adaptation of software-defined networks for IoT systems: a search-based approach
  880. Design of a secure medical data sharing scheme based on blockchain
  881. An Abstraction Technique for Verifying Shared-Memory Concurrency
  882. The SOTA approach to engineering collective adaptive systems
  883. Modelling of electromagnetic energy harvester with rotational pendulum using mechanical vibrations to scavenge electrical energy
  884. On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices
  885. ARCH-COMP20 Category Report: Artificial Intelligence and Neural Network Control Systems (AINNCS) for Continuous and Hybrid Systems Plants
  886. Improving parity game solvers with justifications
  887. Symbolic Verification of Quantum Circuits
  888. Manifold for machine learning assurance
  889. Network pharmacology-based prediction and verification of the mechanism for Bushen Chengyun granule on low endometrial receptivity
  890. Trace elements and machine learning for Brazilian beef traceability
  891. Unbounded-time safety verification of stochastic differential dynamics
  892. Agile requirements engineering in globally distributed software development projects
  893. Incorporating convolutional neural networks and sequence graph transform for identifying multilabel protein lysine PTM sites
  894. The final frontier: Deep learning in space
  895. Targeted induction of a silent fungal gene cluster encoding the bacteria-specific germination inhibitor fumigermin
  896. Compressive strength determination of concrete specimens using X-ray computed tomography and finite element method
  897. Verification of Neural Networks
  898. FY20 Verification of BISON Using Analytic and Manufactured Solutions.
  899. Design and model checking of timed automata oriented architecture for Internet of thing
  900. Performance Verification of a Flexible Vibration Monitoring System
  901. 60 Years of SAT Solving
  902. Automating modular verification of secure information flow
  903. IMDAA Regional Reanalysis: Performance Evaluation During Indian Summer Monsoon Season
  904. Semantic understanding of smart contracts: executable operational semantics of Solidity
  905. Specification of Synchronous Network Flooding in Temporal Logic
  906. Development of a new deformation-controlled rock bolt: Numerical modelling and laboratory verification
  907. Efficient runtime assertion checking for properties over mathematical numbers
  908. Secure remote anonymous user authentication scheme for smart home environment
  909. An efficient statistical model checker for nondeterminism and rare events
  910. Evidence Verification Optimal Design and Practice of Electronic Health Card System Based on FSM
  911. Stability of termination and sufficient-completeness under pushouts via amalgamation
  912. Call graph and model checking for fine-grained android malicious behaviour detection
  913. Guaranteed-safe approximate reachability via state dependency-based decomposition
  914. Investigating Controller Evolution and Divergence through Mining and Mutation*
  915. Trace-driven Modeling and Verification of a Mobility-Aware Service Allocation and Migration Policy for Mobile Edge Computing
  916. Automated formal synthesis of neural barrier certificates for dynamical models
  917. What’s Decidable About Program Verification Modulo Axioms?
  918. Uncertainty-aware specification and analysis for hardware-in-the-loop testing of cyber-physical systems
  919. Private and Public IPR Protection in a Vertically Differentiated Software Duopoly
  920. Simulation Analysis and Experimental Verification of the Locking Torque of the Microgravity Platform of the Chinese Space Station
  921. Deep generation of Coq lemma names using elaborated terms
  922. A classification and systematic review of product line feature model defects
  923. ABCDE–agile block chain DApp engineering
  924. Automatic Verification of Multi-threaded Programs by Inference of Rely-Guarantee Specifications
  925. Dependency graphs with applications to verification
  926. Reliability and Confidentiality Co-Verification for Parallel Applications in Distributed Systems
  927. Safety Versus Security in Aviation, Comparing DO-178C with Security Standards
  928. Protecting Your Digital Health Intellectual Property: Fundamentals of Intellectual Property and How It Applies to Software, Hardware and Business Processes
  929. Case Study: Safety Verification of an Unmanned Underwater Vehicle
  930. Test and evaluation needs of multi-domain autonomous systems
  931. DeepAbstract: neural network abstraction for accelerating verification
  932. Formal methods in dependable systems engineering: a survey of professionals from Europe and North America
  933. Experimental verification of the inverse method of the heat transfer coefficient calculation
  934. An annotation system for specifying aliasing invariants on object fields
  935. Hybrid Discrete Hopfield Neural Network based Modified Clonal Selection Algorithm for VLSI Circuit Verification.
  936. Safe systems programming in Rust: The promise and the challenge
  937. Survey on Parameterized Verification with Threshold Automata and the Byzantine Model Checker
  938. Microplastics on sandy beaches of the southern Baltic Sea
  939. Improved geometric path enumeration for verifying ReLU neural networks
  940. Accelerating Parallel Verification via Complementary Property Partitioning and Strategy Exploration
  941. Potential applications of model checking in probabilistic risk assessments
  942. On Sufficient and Necessary Conditions in Bounded CTL
  943. A moth odorant receptor highly expressed in the ovipositor is involved in detecting host-plant volatiles
  944. BigraphTalk: verified design of IoT applications
  945. Efficient conditional compliance checking of business process models
  946. Formal approach to model complex adaptive computing systems
  947. High-Assurance Cryptography in the Spectre Era
  948. A comprehensive survey of interface protocols for software defined networks
  949. Scaling correctness-by-construction
  950. BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for Internet of medical things deployment
  951. Generating correctness proofs with neural networks
  952. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems
  953. Breaking the circularity in circular analyses: Simulations and formal treatment of the flattened average approach
  954. Formal development of an operation monitoring and control system for nuclear reactors using Event‐B method
  955. Verifying recurrent neural networks using invariant inference
  956. Risk-Based Formal Requirement Elicitation for Automatic Spacecraft Maneuvering
  957. Health management information system (HMIS) data verification: A case study in four districts in Rwanda
  958. A Security Verification Template to Assess Cache Architecture Vulnerabilities
  959. Ethical principles and governance technology development of AI in China
  960. Verification of a robust method for sizing and siting the small hydropower run-of-river plant potential by using GIS
  961. Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405
  962. Residues and enantioselective behavior of cyflumetofen from apple production
  963. Counterexample-guided correlation algorithm for translation validation
  965. New Model-Based Analysis Method with Multiple Constraints for Integrated Modular Avionics Dynamic Reconfiguration Process
  966. Validation and real-life demonstration of ETCS hybrid level 3 principles using a formal B model
  967. SMT-based verification of data-aware processes: a model-theoretic approach.
  968. A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program
  969. Numerical verification of the orders of accuracy of truncated asymptotic expansion solutions to the van der Pol equation
  970. Critical Software For Human Spaceflight: Orion Propulsion Software from Development to Qualification
  971. Development and verification of an aero-hydro-servo-elastic coupled model of dynamics for FOWT, based on the MoWiT library
  972. Efficient provably-secure privacy-preserving signature-based key establishment protocol
  973. Development of the formal model for the presentation of poorly structured and unstructured information
  974. Shrinking counterexamples in property-based testing with genetic algorithms
  975. Automated Verification of Stand-alone Solar Photovoltaic Systems: Optimal Sizing and Project Validation
  976. Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
  977. Система группового управления мобильными роботами с позиций автоматизированного проектирования
  978. Internalização de novos membros em equipes de desenvolvimento de software: uma versão detalhada
  979. A conceptual model for software ecosystem governance
  981. Automatisierung von Hardware/Software Integration Tests auf Mikrocontroller Zielumgebungen
  982. Verificação Automática dos Protocolos de Segurança Needham-Schroeder, WMF e CSA com a ferramenta Scyther
  983. Comprobaci on numerica del proceso de homogeneizaci on mediante el metodo de los elementos finitos. Numerical verification of the homogenization process …
  984. Verificación de Sistemas Concurrentes: Optimalidad, Escalabilidad y Aplicabilidad Verification of Concurrent Systems: Optimality, Scalability and Applicability

Research Topics Computer Science

Topic Covered

Top 10 research topics of Software Formal Verification | list of research topics of Software Formal Verification | trending research topics of Software Formal Verification | research topics for dissertation in Software Formal Verification | dissertation topics of Software Formal Verification in pdf | dissertation topics in Software Formal Verification | research area of interest Software Formal Verification | example of research paper topics in Software Formal Verification | top 10 research thesis topics of Software Formal Verification | list of research thesis  topics of Software Formal Verification| trending research thesis topics of Software Formal Verification | research thesis  topics for dissertation in Software Formal Verification | thesis topics of Software Formal Verification in pdf | thesis topics in Software Formal Verification | examples of thesis topics of Software Formal Verification | PhD research topics examples of  Software Formal Verification | PhD research topics in Software Formal Verification | PhD research topics in computer science | PhD research topics in software engineering | PhD research topics in information technology | Masters (MS) research topics in computer science | Masters (MS) research topics in software engineering | Masters (MS) research topics in information technology | Masters (MS) thesis topics in Software Formal Verification.