Related references
Note: Only part of the references are listed.TapChain: A Rule Chain Recognition Model Based on Multiple Features
Keyu Jiang et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT
Yuan Luo et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
IoT and digital twin enabled smart tracking for safety management
Zhiheng Zhao et al.
COMPUTERS & OPERATIONS RESEARCH (2021)
A3ID: An Automatic and Interpretable Implicit Interference Detection Method for Smart Home via Knowledge Graph
Ding Xiao et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems
Hamada Ibrhim et al.
BUILDING AND ENVIRONMENT (2020)
Supporting end-user debugging of trigger-action rules for IoT applications
Marco Manca et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2019)
SAFECHAIN: Securing Trigger-Action Programming From Attack Chains
Kai-Hsiang Hsu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
Rixin Xu et al.
IEEE ACCESS (2019)
Static analysis of android apps: A systematic literature review
Li Li et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2017)
Rewriting modulo SMT and open system analysis
Camilo Rocha et al.
JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING (2017)
A Survey from the Perspective of Evolutionary Process in the Internet of Things
Feng Wang et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)
Software model checking
Ranjit Jhala et al.
ACM COMPUTING SURVEYS (2009)
Alloy: A lightweight object modelling notation
D Jackson
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2002)