Follow
M. Fareed Arif
Title
Cited by
Cited by
Year
BEACON: an efficient SAT-based tool for debugging ontologies
MF Arif, C Mencía, A Ignatiev, N Manthey, R Peñaloza, J Marques-Silva
International Conference on Theory and Applications of Satisfiability …, 2016
402016
Efficient MUS enumeration of Horn formulae with applications to axiom pinpointing
MF Arif, C Mencía, J Marques-Silva
International Conference on Theory and Applications of Satisfiability …, 2015
332015
Efficient axiom pinpointing with EL2MCS
MF Arif, C Mencía, J Marques-Silva
Joint German/Austrian Conference on Artificial Intelligence (Künstliche …, 2015
222015
Efficient axiom pinpointing in EL using SAT technology
N Manthey, R Penaloza, S Rudolph
CEUR WORKSHOP PROCEEDINGS 1577, 2016
212016
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
M Echeverria, MF Arif
The Network and Distributed System Security Symposium (NDSS), 2021
202021
SYSLITE: syntax-guided synthesis of PLTL formulas from finite traces
MF Arif, D Larraz, M Echeverria, A Reynolds, O Chowdhury, C Tinelli
Formal Methods in Computer-Aided Design 2020 1, 93-103, 2020
182020
Architectural and behavioral analysis for cyber security
K Siu, A Moitra, M Li, M Durling, H Herencia-Zapana, J Interrante, B Meng, ...
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019
182019
Verdict: a language and framework for engineering cyber resilient and safe system
B Meng, D Larraz, K Siu, A Moitra, J Interrante, W Smith, S Paul, D Prince, ...
Systems 9 (1), 18, 2021
152021
A Randomized, Double-Blind, Parallel Group Comparison of Disopyramide Phosphate* and Quinidine in Patients with Cardiac Arrhythmias
M Arif, JC Laidlaw, C Oshrain, PW Willis III, CH Nissen, DJ McDermott, ...
Angiology 34 (6), 393-400, 1983
141983
A double-blind comparison of disopyramide phosphate and quinidine sulphate as anti-arrhythmic agents
C Oshrain, M Arif, JC Laidlaw, WR Cook, P Willis
Report from Scientific Exhibition, 40th Scientific Sessions, American Heart …, 1976
91976
Threat Identification and Defense Control Selection for Embedded Systems
Moitra, A., Prince, D., Siu, K., Durling, M. et al.
SAE International Journal of Transportation Cybersecurity and Privacy 3 (2), 2020
82020
Efficient MUS enumeration of Horn formulae with applications to axiom pinpointing. CoRR abs/1505.04365 (2015)
MF Arif, C Mencıa, J Marques-Silva
URL: http://arxiv. org/abs/1505.04365, 0
3
Security Property Lifecycle Management for Secure Service Compositions
S Hoque, A Rahim, D Llewellyn-Jones, M Merabti
Cyber Security and Privacy Forum, 67-78, 2013
12013
CRV: An Automated Resiliency Reasoner for System Design Models
D Larraz, RM Lorch, M Yahyazadeh, MF Arif, O Chowdhury, C Tinelli
Formal Methods in Computer-Aided Design October 23-27, 2023 Ames, Iowa, USA, 2023
2023
Planning Sudoku for SAT
MF Arif
2020
From μ-Calculus to Alternating Tree Automata using Parity Games
MF Arif
arXiv Report, 2016
2016
The Role of Unsatisfiable Boolean Constraints in Lightweight Description Logics
MF Arif
University College Dublin, 2016
2016
The role of unsatisfiable Boolean constraints in lightweight description logics
MF Arif
University College Dublin. School of Computer Science, 2016
2016
Efficient MUS Enumeration of Horn Formulae with Applications to Axiom Pinpointing
M Fareed Arif, C Mencía, J Marques-Silva
arXiv e-prints, arXiv: 1505.04365, 2015
2015
Towards Efficient Axiom Pinpointing of EL+ Ontologies
MF Arif, J Marques-Silva
arXiv preprint arXiv:1503.08454, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20