BEACON: an efficient SAT-based tool for debugging ontologies MF Arif, C Mencía, A Ignatiev, N Manthey, R Peñaloza, J Marques-Silva International Conference on Theory and Applications of Satisfiability …, 2016 | 40 | 2016 |
Efficient MUS enumeration of Horn formulae with applications to axiom pinpointing MF Arif, C Mencía, J Marques-Silva International Conference on Theory and Applications of Satisfiability …, 2015 | 34 | 2015 |
Efficient axiom pinpointing in EL using SAT technology N Manthey, R Penaloza, S Rudolph CEUR WORKSHOP PROCEEDINGS 1577, 2016 | 22 | 2016 |
Efficient axiom pinpointing with EL2MCS MF Arif, C Mencía, J Marques-Silva Joint German/Austrian Conference on Artificial Intelligence (Künstliche …, 2015 | 22 | 2015 |
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification M Echeverria, MF Arif The Network and Distributed System Security Symposium (NDSS), 2021 | 20 | 2021 |
SYSLITE: syntax-guided synthesis of PLTL formulas from finite traces MF Arif, D Larraz, M Echeverria, A Reynolds, O Chowdhury, C Tinelli Formal Methods in Computer-Aided Design 2020 1, 93-103, 2020 | 20 | 2020 |
Architectural and behavioral analysis for cyber security K Siu, A Moitra, M Li, M Durling, H Herencia-Zapana, J Interrante, B Meng, ... 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019 | 20 | 2019 |
Verdict: a language and framework for engineering cyber resilient and safe system B Meng, D Larraz, K Siu, A Moitra, J Interrante, W Smith, S Paul, D Prince, ... Systems 9 (1), 18, 2021 | 16 | 2021 |
A Randomized, Double-Blind, Parallel Group Comparison of Disopyramide Phosphate* and Quinidine in Patients with Cardiac Arrhythmias M Arif, JC Laidlaw, C Oshrain, PW Willis III, CH Nissen, DJ McDermott, ... Angiology 34 (6), 393-400, 1983 | 15 | 1983 |
A double-blind comparison of disopyramide phosphate and quinidine sulphate as anti-arrhythmic agents C Oshrain, M Arif, JC Laidlaw, WR Cook, P Willis Report from Scientific Exhibition, 40th Scientific Sessions, American Heart …, 1976 | 9 | 1976 |
Threat Identification and Defense Control Selection for Embedded Systems Moitra, A., Prince, D., Siu, K., Durling, M. et al. SAE International Journal of Transportation Cybersecurity and Privacy 3 (2), 2020 | 8 | 2020 |
Efficient MUS enumeration of Horn formulae with applications to axiom pinpointing. CoRR abs/1505.04365 (2015) MF Arif, C Mencıa, J Marques-Silva URL: http://arxiv. org/abs/1505.04365, 0 | 3 | |
Security Property Lifecycle Management for Secure Service Compositions S Hoque, A Rahim, D Llewellyn-Jones, M Merabti Cyber Security and Privacy Forum, 67-78, 2013 | 1 | 2013 |
CRV: An Automated Resiliency Reasoner for System Design Models D Larraz, RM Lorch, M Yahyazadeh, MF Arif, O Chowdhury, C Tinelli Formal Methods in Computer-Aided Design October 23-27, 2023 Ames, Iowa, USA, 2023 | | 2023 |
Planning Sudoku for SAT MF Arif | | 2020 |
From μ-Calculus to Alternating Tree Automata using Parity Games MF Arif arXiv Report, 2016 | | 2016 |
The Role of Unsatisfiable Boolean Constraints in Lightweight Description Logics MF Arif University College Dublin, 2016 | | 2016 |
The role of unsatisfiable Boolean constraints in lightweight description logics MF Arif University College Dublin. School of Computer Science, 2016 | | 2016 |
Efficient MUS Enumeration of Horn Formulae with Applications to Axiom Pinpointing M Fareed Arif, C Mencía, J Marques-Silva arXiv e-prints, arXiv: 1505.04365, 2015 | | 2015 |
Towards Efficient Axiom Pinpointing of EL+ Ontologies MF Arif, J Marques-Silva arXiv preprint arXiv:1503.08454, 2015 | | 2015 |