“…All the experiments were performed on a laptop computer with 8G memory and Intel Core @2.30GHz processor. does not reach the unsafe region [9,10,12,19,20,27,36,50]. In contrast, the alternative simulationbased verification approach, that can be applied in run-time, generates a finite set of simulation traces from current system states, then computes over-approximation sets around those simulation trajectories to cover for the infinite set of cases that were not simulated [51,52,53,54,55].…”