2020
DOI: 10.1007/s00500-020-05299-4
|View full text |Cite
|
Sign up to set email alerts
|

Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…Besides, linear time properties are also covered in the specification step of the underlying system. Examples of the application of MDPs in this field includes the verification of hardware systems [2,3], computer networks [4,5], cyberphysical and cyber-security systems [6][7][8], medical sciences [9] robotics and software systems [10][11][12][13]. In reinforcement learning, the main focus is to approximate the optimal expected reward (or cost) before reaching a final state [14].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, linear time properties are also covered in the specification step of the underlying system. Examples of the application of MDPs in this field includes the verification of hardware systems [2,3], computer networks [4,5], cyberphysical and cyber-security systems [6][7][8], medical sciences [9] robotics and software systems [10][11][12][13]. In reinforcement learning, the main focus is to approximate the optimal expected reward (or cost) before reaching a final state [14].…”
Section: Introductionmentioning
confidence: 99%