Agha, G., & Palmskog, K. (2018). A Survey of Statistical Model Checking. ACM Transactions on Modeling and Computer Simulation, 28(1), 1–39. https://doi.org/10.1145/3158668
MathSciNet
Article
Google Scholar
Al-Turjman, F., & Malekloo, A. (2019). Smart parking in IoT-enabled cities: A survey. Sustainable Cities and Society, 49, 101608.
Article
Google Scholar
Alur, R., & Henzinger, T. (1993). Real-Time Logics: Complexity and Expressiveness. Information and Computation, 104(1), 35–77. https://doi.org/10.1006/inco.1993.1025
MathSciNet
Article
MATH
Google Scholar
Alvarez Carmona, M. A., Carrasco Ochoa, J. A., & Martinez Trinidad, J. F. (2013). Combining techniques to find the number of bins for discretization. In: 2013 32nd International Conference of the Chilean Computer Science Society (SCCC), pp 54–57. https://doi.org/10.1109/SCCC.2013.11
Ballarini, P., Barbot, B., Duflot, M., Haddad, S., & Pekergin, N. (2015). Hasl: A new approach for performance evaluation and model checking from concepts to experimentation. Performance Evaluation, 90, 53–77.
Article
Google Scholar
Barbier, M., Renzaglia, A., Quilbeuf, J., Rummelhard, L., Paigwar, A., Laugier, C., Legay, A., Ibanez-Guzman, J., & Simonin, O. (2019). Validation of perception and decision-making systems for autonomous driving via statistical model checking. In: 2019 IEEE Intelligent Vehicles Symposium (IV), pp 252–259.
Basu, A., Bensalem, S., Bozga, M., Combaz, J., Jaber, M., Nguyen, T. H., & Sifakis, J. (2011). Rigorous Component-Based System Design Using the BIP Framework. IEEE Software, 28(3), 41–48.
Article
Google Scholar
Beaulaton, D., Said, N. B., Cristescu, I., & Sadou, S. (2019). Security Analysis of IoT Systems Using Attack Trees. In M. Albanese, R. Horne, & C. W. Probst (Eds.), Graphical Models for Security (Vol. 11720, pp. 68–94). Cham: Springer International Publishing.
Chapter
Google Scholar
Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: identifying density-based local outliers. ACM SIGMOD Record, 29(2), 93–104. https://doi.org/10.1145/335191.335388
Article
Google Scholar
Chehida, S., Baouya, A., Bensalem, S., & Bozga, M. (2020). Applied statistical model checking for a sensor behavior analysis. In R. Pérez-Castillo (Ed.), Shepperd M, Brito e Abreu F, Rodrigues da Silva A (pp. 399–411). Springer International Publishing, Cham: Quality of Information and Communications Technology.
Google Scholar
COSMOS. (2015). Cosmos tool. http://www.lsv.ens-cachan.fr/Software/cosmos/
Daissaoui, A., Boulmakoul, A., Karim, L., & Lbath, A. (2020). IoT and Big Data Analytics for Smart Buildings: A Survey. Procedia Computer Science, 170, 161–168. https://doi.org/10.1016/j.procs.2020.03.021
Article
Google Scholar
David, A., Larsen, K. G., Legay, A., Mikučionis, M., & Poulsen, D. B. (2015a). Uppaal SMC tutorial. International Journal on Software Tools for Technology Transfer 17(4), 397–415. https://doi.org/10.1007/s10009-014-0361-y
David, A., Larsen, K. G., Legay, A., Mikucionis, M., Poulsen, D. B., & Sedwards, S. (2015b). Statistical model checking for biological systems. International Journal on Software Tools for Technology Transfer, 17(3), 351–367. https://doi.org/10.1007/s10009-014-0323-4
Article
Google Scholar
Dougherty, J., Kohavi, R., & Sahami, M. (1995). Supervised and unsupervised discretization of continuous features. In: Prieditis A, Russell S (eds) Machine Learning Proceedings 1995, Morgan Kaufmann, San Francisco (CA), pp 194 – 202. https://doi.org/10.1016/B978-1-55860-377-6.50032-3
Franco, J. M., Correia, F., Barbosa, R., Zenha-Rela, M., Schmerl, B., & Garlan, D. (2016). Improving self-adaptation planning through software architecture-based stochastic modeling. Journal of Systems and Software, 115, 42–60. https://doi.org/10.1016/j.jss.2016.01.026
Article
Google Scholar
Giannoni, F., Mancini, M., & Marinelli, F. (2018). Anomaly Detection Models for IoT Time Series Data. https://arxiv.org/abs/1812.00890
He, Z., Xu, X., & Deng, S. (2003). Discovering cluster-based local outliers. Pattern Recognition Letters, 24(9–10), 1641–1650. https://doi.org/10.1016/S0167-8655(03)00003-5
Article
MATH
Google Scholar
Hérault, T., Lassaigne, R., Magniette, F., & Peyronnet, S. (2004). Approximate probabilistic model checking. Verification, Model Checking, and Abstract Interpretation (pp. 73–84). Berlin Heidelberg, Berlin, Heidelberg: Springer.
Chapter
Google Scholar
Hill, D. J, Minsker, B. S., & Amir, E. (2009). Real-time Bayesian anomaly detection in streaming environmental data: Real-time bayesia anomaly detection. Water Resources Research 45(4). https://doi.org/10.1029/2008WR006956
Kwiatkowska, M., Norman, G., & Parker, D. (2011). Prism 4.0: Verification of probabilistic real-time systems. In G. Gopalakrishnan & S. Qadeer (Eds.), Computer Aided Verification (pp. 585–591). Heidelberg: Springer, Berlin Heidelberg, Berlin.
Chapter
Google Scholar
Malhotra, P., Vig, L., Shroff, G., & Agarwal, P. (2015). Long short term memory networks for anomaly detection in time series. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Bruges, Belgium.
Mediouni, B. L., Nouri, A., Bozga, M., Dellabani, M., Legay, A., & Bensalem, S. (2018). SBIP 2.0: Statistical Model Checking Stochastic Real-time Systems. In: ATVA 2018 - 16th International Symposium Automated Technology for Verification and Analysis, Springer, Los Angeles, CA, United States, pp 536–542. https://doi.org/10.1007/978-3-030-01090-4_33
Mercaldo, F., Martinelli, F., & Santone, A. (2019). Real-Time SCADA Attack Detection by Means of Formal Methods. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), IEEE, Napoli, Italy, pp 231–236. https://doi.org/10.1109/WETICE.2019.00057
MRMC. (2011). Mrmc tool. http://www.mrmc-tool.org
Naskos, A., Gounaris, A., Mouratidis, H., & Katsaros, P. (2016). Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Computing, 3(5), 26–33. https://doi.org/10.1109/MCC.2016.108
Article
Google Scholar
Nouri, A., Bensalem, S., Bozga, M., Delahaye, B., Jegourel, C., & Legay, A. (2015). Statistical model checking QoS properties of systems with SBIP. International Journal on Software Tools for Technology Transfer, 17(2), 171–185.
Article
Google Scholar
Nouri, A., Mediouni, B. L., Bozga, M., Combaz, J., Bensalem, S., & Legay, A. (2018). Performance evaluation of stochastic real-time systems with the SBIP framework. International Journal of Critical Computer-Based Systems, 8(3/4), 340.
Article
Google Scholar
Park, C., Kim, Y., & Jeong, M. (2018). Influencing factors on risk perception of IoT-based home energy management services. Telematics and Informatics, 35(8), 2355–2365.
Article
Google Scholar
Pnueli, A. (1977). The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, USA, pp 46–57. https://doi.org/10.1109/SFCS.1977.32
Saives, J., Pianon, C., & Faraut, G. (2015). Activity Discovery and Detection of Behavioral Deviations of an Inhabitant From Binary Sensors. IEEE Transactions on Automation Science and Engineering, 12(4), 1211–1224. https://doi.org/10.1109/TASE.2015.2471842
Article
Google Scholar
Shahid, N., Naqvi, I. H., & Qaisar, S. B. (2015). One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments. Artificial Intelligence Review, 43(4), 515–563. https://doi.org/10.1007/s10462-013-9395-x
Article
Google Scholar
Stewart, W. J. (2009). Probability, Markov chains, queues, and simulation: the mathematical basis of performance modeling. Princeton University Press.
Tao, Z. (2020). Advanced Wavelet Sampling Algorithm for IoT based environmental monitoring and management. Computer Communications, 150, 547–555. https://doi.org/10.1016/j.comcom.2019.12.006
Article
Google Scholar
Yang, Y., Webb, G. I., & Wu, X. (2010). Discretization Methods (pp. 101–116). US, Boston, MA: Springer.
Google Scholar
Xie, Yi., & Shun-Zheng, Yu. (2009). A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. IEEE/ACM Transactions on Networking, 17(1), 54–65. https://doi.org/10.1109/TNET.2008.923716
Article
Google Scholar
Younes, H. L. S. (2005). Ymer: A statistical model checker. Computer Aided Verification (pp. 429–433). Berlin Heidelberg: Springer.
Chapter
Google Scholar
Younes, H. L. S., & Simmons, R. G. (2002). Probabilistic verification of discrete event systems using acceptance sampling. In E. Brinksma & K. G. Larsen (Eds.), Computer Aided Verification (pp. 223–235). Berlin Heidelberg: Springer.
Chapter
Google Scholar
Yu, Y., Zhu, Y., Li, S., & Wan, D. (2014). Time Series Outlier Detection Based on Sliding Window Prediction. Mathematical Problems in Engineering, 2014, 1–14. https://doi.org/10.1155/2014/879736
Article
MATH
Google Scholar