[1] |
UR B , MCMANUS E , HO M P Y ,et al. Practical trigger-action programming in the smart home[C]// Sigchi Conference on Human Factors in Computing Systems. ACM, 2014: 803-812.
|
[2] |
LEELAPRUTE P , NAKAMURA M , TSUCHIYA T ,et al. Describing and verifying integrated services of home network systems[C]// Asia-Pacific Software Engineering Conference. IEEE, 2005: 549-558.
|
[3] |
CORNO F , SANAULLAH M . Modeling and formal verification of smart environments[J]. Security & Communication Networks, 2015,7(10): 1582-1598.
|
[4] |
LIANG C J M , LANE N D , ZHAO F ,et al. SIFT:building an Internet of safe things[C]// International Conference on Information Processing in Sensor Networks. ACM, 2015: 298-309.
|
[5] |
LIANG C J M , BU L , LI Z ,et al. Systematically debugging IoT control system correctness for building automation[C]// ACM International Conference on Systems for Energy-Efficient Built Environments. ACM, 2016: 133-142.
|
[6] |
BU L , XIONG W , LIANG C J M ,et al. Systematically ensuring the confidence of real-time home automation IoT systems[J]. ACM Transactions on Cyber-Physical Systems, 2018,2(3): 1-23.
|
[7] |
BAIER C , KATOEN J P . Principles of model checking[M]. Cambridge: The MIT PressPress, 2008.
|
[8] |
HOLZMANN G J . The model checker SPIN[J]. IEEE Transactions on Software Engineering, 1997,23(5): 279-295.
|
[9] |
CIMATTI A , CLARKE E , GIUNCHIGLIA F ,et al. NuSMV:a new symbolic model checker[J]. International Journal on Software Tools for Technology Transfer, 2000,2(4): 410-425.
|
[10] |
BU L , LI Y , WANG L ,et al. BACH :bounded reachability checker for linear hybrid automata[C]// Formal Methods in Computer-Aided Design. IEEE, 2008: 1-4.
|
[11] |
CROCKFORD D . The application/JSON media type for JavaScript object notation (JSON)[J]. RFC, 2006,13(4): 250-251.
|
[12] |
CLARKE E M , EMERSON E A . Design and synthesis of synchronization skeletons using branching time temporal logic[C]// The Workshop on Logic of Programs. Springer, 1981: 52-71.
|
[13] |
PNUELI A . The temporal logic of programs[M]. Rehovot: Weizmann Science PressPress, 1977.
|
[14] |
MUNIR S , STANKOVIC J A . Depsys:dependency aware integration of cyber-physical systems for smart homes[C]// ACM/IEEE International Conference on Cyber-Physical Systems. IEEE, 2014: 127-138.
|
[15] |
SURBATOVICH M , ALJURAIDAN J , BAUER L ,et al. Some recipes can do more than spoil your appetite:analyzing the security and privacy risks of IFTTT recipes[C]// International World Wide Web Conference. ACM, 2017: 1501-1510.
|
[16] |
LI H , ZHOU X . Study on security architecture for Internet of things[C]// International Conference on Applied Informatics and Communication. Springer, 2011: 404-411.
|
[17] |
RIAHI A , CHALLAL Y , NATALIZIO E ,et al. A systemic approach for IoT security[C]// IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, 2013: 351-355.
|
[18] |
RIERA B,VIGáRIO B . HOME I/O and FACTORY I/O:a virtual house and a virtual plant for control education[J]. IFAC-Papers on Line, 2017,50(1): 9144-9149.
|
[19] |
ALSHAMMARI N , ALSHAMMARI T , SEDKY M ,et al. OpenSHS:open smart home simulator[J]. Sensors, 2017,17(5):1003.
|