<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Reasoning about Real-Time and Probability on Obstruction Logic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jean Leneutre</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadim Malvone</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>James Ortiz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>LTCI, Télécom Paris, Institut Polytechnique de Paris</institution>
          ,
          <addr-line>Palaiseau</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper discusses Timed Obstruction Temporal Logic (TOTL) and Probabilistic Obstruction Temporal Logic (POTL), extensions of Obstruction Logic for systems with critical timing and probabilistic behavior. TOTL focuses on real-time system properties, while POTL handles uncertainty and stochastic events alongside temporal constraints. These logics are especially useful in cybersecurity, where both time and probability are crucial. We demonstrate their applicability through case studies in cybersecurity games based on attack graphs.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Timed Systems</kwd>
        <kwd>Dynamic games</kwd>
        <kwd>Attack Graphs</kwd>
        <kwd>Markov Chain</kwd>
        <kwd>Strategic Reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Demon and the Traveler, who interact on a directed graph with edges associated with deactivation
costs. The Demon attempts to obstruct the Traveler by deactivating certain edges within a budget,
while the Traveler navigates the graph. The game progresses in rounds, with the Demon winning if
the Traveler’s path satisfies a specific temporal property. OL is particularly useful in cybersecurity,
where it can model scenarios involving attackers and defenders, enabling the design of dynamic defense
strategies using concepts like Attack Graphs (AG) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and Moving Target Defense (MTD) mechanisms.
However, these logics often fall short when it comes to dealing with the complex time constraints,
probabilistic behaviors, and dynamic models that are a hallmark of cybersecurity.
      </p>
      <p>To address these challenges, we discuss two extensions of the obstruction logic: Timed Obstruction
Temporal Logic (TOTL) and Probabilistic Obstruction Temporal Logic (POTL). TOTL builds on the
foundation of temporal logic by incorporating constructs that allow precise modeling of time-dependent
behavior. This makes TOTL particularly suitable for real-time systems where the timing of actions and
events must be meticulously managed. POTL, on the other hand, adds probabilistic reasoning to the
framework. This allows for the analysis of systems where outcomes are influenced by both deterministic
and stochastic factors. By integrating probability with temporal logic, POTL allows for a more nuanced
understanding of system behavior under uncertainty. This is essential in domains such as cybersecurity,
where the likelihood of certain events must be carefully assessed.</p>
      <p>Together, TOTL and POTL provide a unified framework for reasoning about systems that are both
time-sensitive and probabilistically complex. This paper explores the syntax and semantics of these
logics and illustrates their power and flexibility with practical examples. Through examples, we show
how these logics can be applied to real-world scenarios, such as the formal verification of security
protocols and the optimization of defense strategies in the face of sophisticated cyber threats. By
leveraging the capabilities of TOTL and POTL, system designers and security analysts can better
manage the trade-ofs between time, probability, and system performance, ultimately leading to more
secure and reliable digital infrastructures.</p>
      <p>Structure of the work. In Section 2, we present the syntax and the semantics of our logics, called
Timed Obstruction Logic (TOL) and Probabilistic Obstruction Temporal Logic (POTL). In Section 3, we
present our case study in the cybersecurity context. In Section 4, we compare our approach to related
work. Finally, Section 5 concludes and presents possible future directions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Model and Logic</title>
      <p>In this section, we define the syntax and semantics of our Probabilistic Obstruction Temporal Logic
(POTL) and Timed Obstruction Temporal Logic (TOTL).</p>
      <sec id="sec-2-1">
        <title>2.1. Syntax and Semantics of POTL</title>
        <p>Here, we introduce the Probabilistic Obstruction Temporal Structure (POTS), the type of model that we
use to verify POTL properties. Let us start with some probabilistic concepts. A probability distribution
over a finite set assigns probabilities to each element such that the total sum is 1. A probability space,
which consists of a sample space, is a set of possible events (a  -algebra), and a probability measure
assigns probabilities to these events.</p>
        <p>
          Definition 1 ( Markov Chain). A Markov Chain (MC) is a pair ℋ = (, P) where  is a (countable)
set of states and P:  ×  → [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] is a transition probability function such that for each state  ∈ ,
Σ′∈P(, ′) = 1. If  is finite, we can consider P to be a transition matrix.
        </p>
        <p>Definition 2 (Probabilistic Kripke Structure (PKS)). A PKS over a set AP of atomic propositions is
a tuple  = ⟨, 0, P, ℒ⟩ where (, P) is a MC, 0 ∈  is the initial state, and ℒ :  → 2AP is a labeling
function assigning a set of atomic propositions to any state  ∈ .</p>
        <p>Definition 3 (Probabilistic Obstruction Temporal Structure). A POTS (model for short) is given
by a tuple ℳ = (, 0, P, ℒ, C) where  = (, 0, P, ℒ) is a PKS and C :  ×  → N is a function
assigning to any pairs (, ′) a natural number  ∈ N.</p>
        <p>A path  over ℳ is a finite or infinite sequence of states  = 0, 1, 2, . . . starting from the initial
state 0, where each step satisfies P(, +1) &gt; 0 for all  ∈ N. We use   to denote the -th state  in
 ,  ≤  for the prefix 0, . . . , , and  ≥  for the sufix , +1 . . .. The set of all finite paths from a state
 ∈  in the model ℳ is denoted by Paths+ℳ,, and the set of all infinite paths is Paths*ℳ,. A history ℎ
is any finite path prefix, with  denoting the set of all histories, and (ℎ) representing the last state
of a history ℎ. Given a finite path ^ = 0, 1, . . . ,  of states, the cylinder set of ^, denoted Cyl(^) =
{ ∈ Paths*ℳ,0 | ^ ∈ Prefix( )}, is the set of infinite paths  = 0, 1, · · · , , · · · , where ^ is a prefix
of  . The set of infinite paths is supposed to be equipped with the  -algebra generated by the cylinder
sets of the finite paths and the probability measure given by Pr0 (Cyl(^)) = ∏︀=−01 P(, +1).
ℳ
Definition 4. Let ℳ be a model,  be states in ℳ, C is the function cost and  be a natural number, a
-strategy is a function S :  → 2×  that, given a history ℎ, returns a subset  ∈  × , such that: (i)
 ⊂ E((ℎ)) and (ii) (∑︀∈ C()) ≤ . A memoryless n-strategy is a n-strategy S such that for all
histories ℎ and ℎ′ if (ℎ) = (ℎ′) then S(ℎ) = S(ℎ′) and E((ℎ)) denotes its outgoing edges,
where E() = { ∈  ×  |  = (, ′) for some ′ ∈  and P(, ′) &gt; 0}.</p>
        <p>A path  is compatible with an n-strategy S if for all  ≥ 1 we have that ( ,  +1) ∈/ S( ≤ ). The set
of outcomes of an -strategy S and state  is denoted as Out(, S) and it returns the set of all paths
that can result from a strategy S and a state .</p>
        <p>
          Definition 5. Let AP be an at most countable set of atomic formulas (or atoms). Formulas of Probabilistic
Obstruction Temporal Logic (POTL, for short) are defined by the following grammar:
◁▷ 
 ::= ⊤ |  | ¬ |  ∧  | ⟨  ⟩
 ::= X  |  U ≤  |  U  |  R ≤  |  R 
where  ∈ AP is an atomic formula,  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] is a rational constant,  (the grade) and  are any natural
number in N, and ◁▷ ∈ {≤ , &lt;, &gt;, ≥} .
        </p>
        <p>In this syntax, state formulas  are evaluated over states, and path formulas  are evaluated over paths.
Model properties are expressed as state formulas, with path formulas used only in the probabilistic path
◁▷⟩ . Temporal operators like  (next), U ≤  (bounded until), U (until), R ≤  (bounded
operator ⟨ 
release), and R (release), are allowed in path formulas. The parameter  is the grade of the strategic
operator. Boolean connectives ⊥, ∨, and → are defined as usual. The formula ⟨ ◁▷⟩ with  means
“there is a demonic strategy such that all paths compatible with the strategy satisfy  with a probability
◁▷ ", where a demonic strategy disables arcs. POTL formulas are interpreted over POTS, and we can
now define their semantics precisely.</p>
        <p>Definition 6. The satisfaction relation between a model ℳ, a state  of ℳ, and a formula  is defined
by induction on the structure of  :</p>
        <p>◁▷  if there is a n-strategy S such that Prℳ({ ∈ Out(, S) | ℳ,  |=  }) ◁▷ .
• ℳ,  |= ⟨  ⟩
The satisfaction relation ℳ,  |=  between a model ℳ, a path  ∈ Paths*ℳ, of ℳ, and path formula 
is defined as follows:
• ℳ,  |= X  if ℳ,  2 |=  .
• ℳ,  |=  1 U ≤  2 if there is an 0 ≤  ≤  such that ℳ,   |=  2 and ℳ,   |=  1 for all
0 ≤  &lt; .
• ℳ,  |=  1 U  2 if there is an  ≥ 0 such that ℳ,   |=  2 and ℳ,   |=  1 for all 0 ≤  &lt; .
• ℳ,  |=  1 R ≤  2 if either ℳ,   |=  2 for all 0 ≤  ≤  or there is an 0 ≤  ≤  such that
ℳ,   |=  1 and ℳ,   |=  2 for all 0 ≤  ≤ .
• ℳ,  |=  1 R  2 if either ℳ,   |=  2 for all  ≥ 0 or there is an  ≥ 0 such that ℳ,   |=  1
and ℳ,   |=  2 for all 0 ≤  ≤ .</p>
        <p>Let  be a formula and ℳ be a model. Then Sat(, ℳ) denotes the set of states of ℳ that satisfy  ,
i.e., Sat(, ℳ) = { ∈  | ℳ,  |=  }. Two formulas  and  are equivalent (denoted by  ≡  ) if,
for all models ℳ, Sat(, ℳ) = Sat(, ℳ). The semantics of the obstruction probabilistic operator
⟨ ◁▷⟩ refers to the probability for the sets of paths where a path formula holds. To ensure that this
is well-defined, we need to establish that the events specified by POTL path formulas are measurable.
Since the set { ∈ Out(, S) | ℳ,  |=  } for POTL path formula  can be considered as a countable
union of cylinder sets, its measurability is ensured. This follows from the following lemma.
Lemma 1. For each POTL path formula  and state  of a model ℳ, the set { ∈ Out(, S)| ℳ,  |=  }
is measurable.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Syntax and Semantics of TOTL</title>
        <p>
          Here, we present the Weighted Timed Automata (WTA), the type of model that we use to verify TOTL
properties. A WTA is an extension of a TA [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] with weight/cost information at both locations and
edges, and it can be used to address several interesting questions [
          <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
          ]. In WTA (also TA) are used
non-negative real-valued variables called clocks to represent the continuous time domain [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
Definition 7 (Clock constraints and invariants). Let X be a finite set of variables ranging over R≥ 0,
called clocks. The set Φ() of clock constraints over the set of clocks X is given by the following grammar:
 :=  | x ∼ c | 1 ∧ 2
where x ∈ X, c ∈ N, and ∼ ∈ { &lt;, &gt;, ≤ , ≥ , =}.
        </p>
        <p>Clock invariants Δ(X) are clock constraints in which ∼∈ { &lt;, ≤} .</p>
        <p>Definition 8 (Clock valuations). Given a finite set of clocks X, a clock valuation function,  : X → R≥ 0
assigning to each clock  ∈ X a non-negative value  (). We denote R≥0 the set of all valuations. For a clock
valuation  ∈ R≥0 and a time value d ∈ R≥ 0,  + d is the valuation satisfied by ( + )() =  () + 
for each  ∈ X. Given a clock subset  ⊆ , we denote  [ ← 0] the valuation defined as follows:
 [ ← 0]() = 0 if  ∈  and  [Y ← 0]() =  () otherwise.</p>
        <p>Definition 9 (Clock valuations). Given a finite set of clocks X, a clock valuation function,  : X → R≥ 0
assigning to each clock  ∈ X a non-negative value  (). We denote R≥0 the set of all valuations. For a clock
valuation  ∈ R≥0 and a time value d ∈ R≥ 0,  + d is the valuation satisfied by ( + )() =  () + 
for each  ∈ X. Given a clock subset  ⊆ , we denote  [ ← 0] the valuation defined as follows:
 [ ← 0]() = 0 if  ∈  and  [Y ← 0]() =  () otherwise.</p>
        <p>Definition 10 (Weighted Timed Automata ( WTA)). Let  be a finite set of clocks and AP a finite
set of atoms. A WTA is a tuple  = (, 0, , Σ, , , , ℒ,  ), where:  is a finite set of locations, 0 ∈ 
is an initial location,  is a finite set of clocks, Σ is a finite set of actions,  ⊆  × Σ × Φ() × 2 × 
is a finite set of edges (or transitions),  :  → Δ() is a function that associates to each location a clock
invariant, :  → N≥ 0 is a function that labels the elements of  , ℒ :  → 2AP is a labeling function for
the locations,  ⊆  is a set of goal locations.</p>
        <p>In WTA, costs are explicitly defined in its syntax, however, they do not influence the discrete behavior
of the system. Since there is no cost constraint, the semantics of a WTA is similar to that of a TA. It
is thus given as a Timed Transition System (TTS). In a TTS() = (Q, q0, ΣΔ, , , ℒ, Q ), the states
 are pairs of locations and clock valuations, with initial state 0=(0,  0), where all clocks  ∈  are

initially 0, ΣΔ = Σ ⊎ R≥ 0, the transition relation  includes discrete transitions (,  →)−  (′,  ′) based
on satisfying guards and clock resets, and delay transitions (,  →)−  (,  + ) for valid time elapses, the
labeling function ℒ assigns atomic propositions to states based on their location and clock valuations
and  ⊆  × R≥0.</p>
        <p>A path  in TTS() is an infinite sequence of consecutive delays and discrete transitions. A finite path
fragment of  is a run in TTS() starting from the initial state 0 = (0,  0), with delay and discrete
transitions alternating along the path:  = 0 →−0 1′ →−a00 1 →−1 2′ →−a11 2 . . . − →1−− − − 1 ′ →−−   . . ..
We write   to denote the -th element  = (,  ) of  ,  ≤  to denote the prefix 0, . . . ,  of  , and  ≥ 
to denote the sufix , +1 . . . of  . A history is any finite prefix of some path. We use  to denote the
set of histories. Let  be a WTA. Here, we will use  ′ to indicate the set of deactivated edges in . We
will also use ind( ′) to indicate the set of edges induced by the deactivated edges in  ′ in the TTS().
Definition 11. Let  be a WTA and  be a natural number. Given a model TTS(), a -strategy is a
function S :  → 2 that, given a history ℎ, returns a subset  ′ such that: (i)  ′ ⊂  ((ℎ)), (ii)
ind( ′) ⊂ ((ℎ)), and (iii) (∑︀∈ ′ C()) ≤ . A memoryless -strategy is a -strategy S such that
for all histories ℎ and ℎ′ if (ℎ) = (ℎ′) then S(ℎ) = S(ℎ′).</p>
        <p>A path  is compatible with a -strategy if for all  ≥ 1, ( , ,  +1) ∈/ S( ≤ ), where  ∈ Σ.</p>
        <p>Given a state  = (,  ) and a -strategy S, (, S) refers to the set of pathways starting from 
that are consistent with S.</p>
        <p>Definition 12. Let  be a WTA, AP a set of atomic propositions (or atoms), a set  of clocks of , and 
a non-empty set of clocks of the formula, where  ∩  = ∅. Formulas of Timed Obstruction Temporal Logic
(TOTL) are defined by the following grammar:</p>
        <p>::= ⊤ |  | ¬ |  1 ∧  2 |  | ⟨ ⟩( 1 U  2) | ⟨ ⟩( 1 R  2) | .
where  ∈ AP is an atomic formula,  ∈  ,  ∈ N≥ 0 represents the grade of the strategic operator, and 
∈ Φ( ∪  ).</p>
        <p>It is possible to compare a formula clock with an automata clock using clock constraints , which
apply to both. Boolean connectives ⊥, ∨, and → are defined as usual. In the formula . , the clock
 is called freeze identifier, which means  starts at 0 in the current state, and  must hold from
that point. This can express timing requirements like punctuality or bounded response. For example,
.⟨ ⟩(( 1 ∧  ≤ 7) U  2) means there is a demonic strategy ensuring  1 holds until  2 becomes valid
within 7 time units. The intuitive meaning of a formula ⟨ ⟩ with  timed temporal formula is: there is
a demonic strategy such that all paths of the TTS that are compatible with the strategy satisfy  . Unlike
OL, TOTL does not use the next operator because time is continuous, and there is no unique “next"
time. However, TOTL allows timing constraints, called timed temporal formulas, which are interpreted
over TTS. The semantics of TOTL formulas are now defined precisely.</p>
        <p>Definition 13 ( TOTL Semantics). Let  be a WTA, a set  of clocks of ,  a non-empty set of clocks
of the formula,  ∈ AP,  ∈ Φ( ∪  ), and ℳ = TTS(). An extended state over  is a triple (, ,  ),
where  = (,  ) ∈  is a WTS state and  a valuation for the formula clocks in  . The satisfaction relation
between a TTS ℳ, TOTL formulas  and  , and an extended state  = (, ,  )1 of the formula, is given
inductively as follows (Boolean operators are omitted because they are defined as usual):
• ℳ,  |=  if  |= .
• ℳ,  |= ⟨ ⟩( U  ) if there is a -strategy S such that for all  ∈ (, S) there is a  ∈ N
such that ℳ,   |=  and for all 0 ≤  &lt; , ℳ,   |=  .
1To facilitate reading, from this point onward we will use only the symbol  for an extended state.</p>
        <p>• ℳ,  |= ⟨ ⟩( R  ) if there is a -strategy S such that for all  ∈ (, S) we have that
either ℳ,   |=  for all  ∈ N or there is a  ∈ N such that ℳ,   |=  and ℳ,   |=  for all
0 ≤  ≤ .</p>
        <p>• ℳ,  |= . if ℳ, (,  [ ← 0],  ) |=  .</p>
        <p>Two formulas  and  are semantically equivalent (denoted by  ≡  ) if for any model ℳ and
extended state  of ℳ, ℳ,  |=  if ℳ,  |=  . The relationship between WTA and TTS is defined as
follows.</p>
        <p>Proposition 1. Let  be a WTA and  ∈ TOTL, then  |=  if TTS() |=  .</p>
        <p>Let  be a formula, the set of extended states satisfying  is independent of the valuation  for the
formula clocks. Thus, for any state  = (,  ) in a TTS and valuations  ,  ′ for the formula clocks, we
can get that ℳ, (, ,  ) |=  if ℳ, (, ,  ′) |=  . Therefore, when  is closed, it makes sense to talk
about a state  that satisfies  . Let  be any formula, ( ∪  ) a set of clocks (formula and automaton)
and  be a WTA, then Sat( ) denotes the set of extended states of ℳ = TTS() verifying,  , i.e.,
Sat( ) = { ∈  | ℳ,  |=  }.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Case Study</title>
      <sec id="sec-3-1">
        <title>3.1. Probabilistic Scenario</title>
        <p>In this section, we consider two case study related to cybersecurity scenario.</p>
        <p>Probability theory is well-suited for cybersecurity risk analysis because it provides a framework for
understanding and quantifying uncertainty. To illustrate this, we will consider the following general
cybersecurity scenario. Let  be an AG and we want to check if there are MTD response strategies that
will satisfy certain security goals.</p>
        <p>!</p>
        <p>S0
exploit(v1 )</p>
        <p>S1
exploit(v2 )
0.30
0.70
access( t )</p>
        <p>S2
S3</p>
        <p>Consider the AG in Fig. 1 with four states: 0, 1, 2, and 3. Each state represents a state of the
attacker in the system. If the attacker is in 0 or 1, he can perform one or two of the following
actions: exploit vulnerability 1, exploit vulnerability 2, and access device . If the attacker succeeds
in exploiting 1, he will transition to state 1. Here, we assume that depending on the attacker’s
preferences, there are 70% chance that the attacker will attempt to access equipment  and a 30%
chance that he will attempt to exploit 2. In Table 1, there are the three possible actions the attacker</p>
        <sec id="sec-3-1-1">
          <title>Action</title>
          <p>exploit(1)
access()
exploit(2)</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Countermeasure</title>
          <p>1
2
3</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>Cost 5 1 3</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>Eficiency</title>
          <p>
            47.5%
22.5%
24.7%
can deploy, with their respective countermeasures, cost, and efectiveness. Let Fig. 2 depict the POTS
ℳ, constructed using the information from the attack graph presented in [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]. Notice that, in contrast
to [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], here we remove the actions because we do not have any actions in our POTS model. Therefore,
the probabilities present in each state of the model are divided by the number of outgoing actions of
that state. In Fig. 2 the yellow line (do nothing), indicates that no countermeasure will be deployed. The
red lines (1 in Table 1), refer to a defensive countermeasure aimed at protecting the system against the
attack attempt. However, 1 has an eficiency of 47.5 %. Therefore, an attacker attempting to exploit(1)
has a 5% chance of success. The violet lines (2) are a defensive countermeasure against accessing
equipment  and have an eficiency of 22.5 %. The orange lines (3) are a defensive countermeasure
against exploiting vulnerability 2 and have an eficiency of 24.7 %. Finally, green lines refer to the
deployment of countermeasures 2 and 3 at the same time. Let us take the case where the defender
chooses to deploy the countermeasure 3 (orange lines) in state 1, the attacker can either succeed or
fail in his attack attempt. The eficiency of 3 is 24.7%. Therefore, the probability that the attacker fails
in his attack attempt is 0.07425 (exploit(2) × eficiency (3)). Otherwise, the probability of success is
of 0.00075.
          </p>
          <p>ℳ</p>
          <p>S0
0.475</p>
          <p>Let 2 and 3 be the atomic propositions for the states, 2 and 3. We can express, via POTL formulas,
the following security objective:
• There is a defender strategy with a cost 4 such that the attacker reaches the state satisfying 2 or the
state satisfying 3 with a probability less than a given threshold 0.1. The following POTL formula
captures the objective:  1 := ⟨ 4&lt;0.1 ⟩F (2 ∨ 3).
• There exists a defender strategy with cost 5 such that the probability that the attacker reaches state
satisfying 3 is less than 0.2. The following POTL formula captures the objective:  1 := ⟨ 5&lt;0.2 ⟩F 3.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Timed Scenario</title>
        <p>Based on the concepts of AG presented in Section 1, we want to determine if there are MTD strategies
that can satisfy specific security objectives. To do this, we assume: (1) The defender always knows the
attacker’s current state in the AG. (2) At any moment, there is a unique current state for the attacker
in the AG. (3) When the attacker’s state is detected, the defender can activate one or more MTDs to
temporarily remove outgoing edges from that state. (4) The total cost of deactivated edges is below a
given threshold. (5) If the attacker launches an attack from its current state and the corresponding edge
hasn’t been removed, the attack succeeds, moving the attacker to the next state. (6) if the corresponding
edge has been removed, the attack fails, and the attacker remains in the current state. In the model in
Fig. 3 assume that reaching states 1, 3, or 5 gives the attacker root privileges on a critical server .
In addition, if the attacker completes attack steps 6 or 7 (reaching state 5), then the defender will
obtain information on the identity of the attacker. Let  be an atomic proposition that expresses the fact
that the identity of the attacker is known. Let  be an atomic proposition expressing the fact that the
attacker has root privilege on the server . We can express, via TOL formulas, the following security
objectives:
• The attacker will never be able to obtain root privileges on server s unless the defender can obtain
information about his identity within 3 time units: that is, either we want the attacker to never
reach a state satisfying  or if the attacker reaches such a state, the defender wants to be able to
identify it within 3 time units (). By using 1 as a variable, the following TOL formula captures
the objective:  1 := .⟨ 1 ⟩G ( ∨ ( → ⟨ 1 ⟩F(j ≤ 3 ∧ ))).
• While the defender has not obtained information about the attacker identity within 5 time units, the
attacker has not root privilege on the server : that is, we want  to be false until we have identified
the attacker () within 5 time units, if such an identification ever happens. Thus, by using 2
as a variable for a given threshold, we can write our objective by using the until connective:
 2 := .⟨ 2 ⟩(¬ ∧  ≤ 5 U ).</p>
        <p>Suppose that 1 and 2 are respectively 3 and 4. Let ℳ = TTS(), we have that ℳ, 0 |=  1 ∧  2.
To satisfy  1 consider the 3-memoryless strategy S1 that associates {⟨1, 2⟩} to 1, {⟨3, 4⟩} to 3,
and ∅ to any other state of ℳ. Remark that for any path  ∈ (0, S1) and any  ∈ N we have that
ℳ,   |=  if   ∈ {1, 3, 5}. Thus, we must establish that ℳ satisfies ⟨ 3⟩F( ≤ 3 ∧ ) on 1 (resp.
3 and 5). To do so, we remark that (1, S1) (resp. (3, S1) and (5, S1)) only contains
the path 1, 3, 5 (resp. 3, 5 and ) and that ℳ, 5 |= . Thus, we have obtained that there is a
5
strategy (i.e. S1) such that for all  ∈ (0, S1) and all  ∈ N either ℳ,   |= ¬ or if ℳ,   |= 
then there is a strategy (S1 itself) such that ℳ,   |=  for some  ≥ 1 and for all  ∈ ( , S1), as
we wanted. Remark that if 1 &lt; 3 then it is impossible to satisfy  1 in ℳ at 0. For the specification
 2 = .⟨ 4⟩(¬ ∧  ≤ 5 U ), consider the 4-memoryless strategy S2 that associates {⟨0, 1⟩} to 0,
{⟨2, 1⟩, ⟨2, 3⟩} to 2, {⟨4, 3⟩} to 4 and ∅ to 5. The only path in (0, S⋆) is 0, 2, 4, 5 and
since 5 satisfies  and all the other  do not satisfy  we obtain the wanted result.</p>
        <p>S0
a2, x≤ 2, x:= 0</p>
        <p>2
a1, x&gt; 1 3</p>
        <p>3
a1, y&gt; 1, y:= 0</p>
        <p>S2
a2x,:x=&lt;05, 2
a4, y&gt; 1, y:= 0
4</p>
        <p>S4
a4, x &gt; 2,
1
4 a5, y &lt; 5, 3
y:= 0
a7, x &gt; 5,
x:= 0
6
5
a6, y &gt; 5,
y:= 0
a8</p>
        <p>S5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Related Work</title>
      <p>
        Many papers have focused on the strategic capabilities of agents playing within dynamic game models.
In this section, we compare our approach with some of these papers. Previous research on sabotage
games by van Benthem led to Sabotage Modal Logic (SML) for graph reachability problems, with a
PSPACE-complete model checking problem [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Unlike sabotage games, where only one edge can
be removed at a time, our approach allows temporary deactivation of edge subsets, similar to Subset
Sabotage Modal Logic (SSML) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], which lacks temporal operators and cost considerations. Our Timed
Obstruction Logic (TOL) extends Obstruction Logic (OL) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] by incorporating real-time elements, setting
it apart from other strategic logics like ATL [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and SCTL [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], which do not account for edge costs,
real-time, or dynamic models. Timed Game Automata (TGA) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] allow players to choose transitions
and wait times, with extensions like TATL [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and STCTL [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] incorporating timing requirements.
However, these models do not address dynamic changes. Probabilistic logics like PSL [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], PATL, and
PATL* [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] extend ATL to handle stochastic games and probabilistic strategies. Further studies [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
explore probabilistic  -calculus and strategies under incomplete information [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. However, these
logics do not combine probabilistic reasoning with dynamic models.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>
        Timed Obstruction Temporal Logic (TOTL) and Probabilistic Obstruction Temporal Logic (POTL) provide
powerful frameworks for reasoning about systems where timing and probability are critical factors. By
extending traditional temporal logics to account for both timed constraints and probabilistic behaviors,
TOTL and POTL allow for the specification and verification of complex properties in systems like smart
grids, where security, reliability, and performance are paramount. In our case study, we demonstrated
how TOTL and POTL could be applied to analyze and enhance the security of a smart grid under
cyber-attack. The ability to model both time-sensitive and probabilistic aspects of defense strategies
enables system designers and security analysts to develop more robust and cost-efective solutions.
There are several directions we would like to explore for future work. First of all, extending TOTL and
POTL to support reasoning about multi-agent systems, where multiple defenders and attackers interact,
would provide a more comprehensive framework for analyzing complex, distributed environments.
Additionally, integrating TOTL and POTL with machine learning techniques could lead to more adaptive
and intelligent defense strategies. For example, reinforcement learning could be used to optimize the
selection of defense strategies based on real-time feedback from the system. Finally, we would like to
implement these two logics in the VITAMIN tool [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. This tool supports a variety of specifications,
including Obstruction Logic (OL) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and Obstruction ATL (OATL) [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], like Alternating-time
Temporal Logic (ATL) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], ATL with Fuzzy functions (ATLF) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], Natural ATL (NatATL) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], Natural SL
(NatSL) [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], Resource-Bounded ATL (RB-ATL) [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ], Resource Action-based Bounded ATL [26], and
Capacity ATL (CapATL) [27].
multi-agent systems, in: M. Alderighi, M. Baldoni, C. Baroglio, R. Micalizio, S. Tedeschi (Eds.),
Proceedings of the 25th Workshop "From Objects to Agents", Bard (Aosta), Italy, July 8-10, 2024,
volume 3735 of CEUR Workshop Proceedings, CEUR-WS.org, 2024, pp. 148–160. URL: https://
ceur-ws.org/Vol-3735/paper_12.pdf.
[26] D. Catta, A. Ferrando, V. Malvone, Resource action-based bounded atl: a new logic for mas to
express a cost over the actions, in: R. Arisaka, V. S. Anguix, S. Stein, R. Aydogan, L. van der Torre,
T. Ito (Eds.), PRIMA 2024: Principles and Practice of Multi-Agent Systems - 25th International
Conference, Kyoto, Japan, November 18-24, 2024, Proceedings, volume to appear of Lecture Notes
in Computer Science, Springer, 2024.
[27] G. Ballot, V. Malvone, J. Leneutre, Y. Laarouchi, Strategic reasoning under capacity-constrained
agents, in: M. Dastani, J. S. Sichman, N. Alechina, V. Dignum (Eds.), Proceedings of the 23rd
International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland,
New Zealand, May 6-10, 2024, International Foundation for Autonomous Agents and Multiagent
Systems / ACM, 2024, pp. 123–131. URL: https://dl.acm.org/doi/10.5555/3635637.3662859. doi:10.
5555/3635637.3662859.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Aineto</surname>
          </string-name>
          , R. De Benedictis,
          <string-name>
            <given-names>M.</given-names>
            <surname>Maratea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mittelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Monaco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Scala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Serafini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Serina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Spegni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tosello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Umbrico</surname>
          </string-name>
          , M. Vallati (Eds.),
          <source>Proceedings of the International Workshop on Artificial Intelligence for Climate Change, the Italian workshop on Planning and Scheduling</source>
          , the RCRA Workshop on
          <article-title>Experimental evaluation of algorithms for solving problems with combinatorial explosion, and</article-title>
          the Workshop on Strategies, Prediction, Interaction, and
          <article-title>Reasoning in Italy (AI4CC-IPS-RCRA-SPIRIT 2024), co-located with 23rd International Conference of the Italian Association for Artificial Intelligence</article-title>
          (AIxIA
          <year>2024</year>
          ), CEUR Workshop Proceedings, CEUR-WS.org,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lomuscio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Qu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Raimondi</surname>
          </string-name>
          ,
          <string-name>
            <surname>MCMAS:</surname>
          </string-name>
          <article-title>A model checker for the verification of multi-agent systems</article-title>
          ,
          <source>in: Proceedings of the 21th International Conference on Computer Aided Verification (CAV09)</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kupferman</surname>
          </string-name>
          ,
          <article-title>Alternating-time temporal logic</article-title>
          ,
          <source>J. ACM</source>
          <volume>49</volume>
          (
          <year>2002</year>
          )
          <fpage>672</fpage>
          -
          <lpage>713</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mogavero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          , G. Perelli,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Vardi</surname>
          </string-name>
          ,
          <article-title>Reasoning about strategies: On the model-checking problem</article-title>
          ,
          <source>ACM Transactions in Computational Logic</source>
          (
          <year>2014</year>
          ). URL: http://doi.acm.
          <source>org/10</source>
          .1145/ 2631917. doi:
          <volume>10</volume>
          .1145/2631917.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Catta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leneutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <article-title>Obstruction logic: A strategic temporal logic to reason about dynamic game models</article-title>
          ,
          <source>in: ECAI 2023 - 26th European Conference on Artificial Intelligence</source>
          ,
          <year>2023</year>
          . URL: https://doi.org/10.3233/FAIA230292. doi:
          <volume>10</volume>
          .3233/FAIA230292.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Durkota</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lisý</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bosanský</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kiekintveld</surname>
          </string-name>
          ,
          <article-title>Optimal network security hardening using attack graph games</article-title>
          , in: Q.
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          <string-name>
            <surname>Wooldridge</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI</source>
          <year>2015</year>
          , AAAI Press,
          <year>2015</year>
          , pp.
          <fpage>526</fpage>
          -
          <lpage>532</lpage>
          . URL: http://ijcai.org/Abstract/15/080.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dill</surname>
          </string-name>
          ,
          <article-title>A theory of timed automata</article-title>
          ,
          <source>Theoretical computer science 126</source>
          (
          <year>1994</year>
          )
          <fpage>183</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bouyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Fahrenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Larsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Markey</surname>
          </string-name>
          ,
          <article-title>Quantitative analysis of real-time systems using priced timed automata</article-title>
          ,
          <source>Communications of the ACM</source>
          (
          <year>2011</year>
          ). URL: http://www.lsv.fr/Publis/ PAPERS/PDF/BFLM-cacm11.
          <source>pdf. doi:10.1145/1995376</source>
          .1995396.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. La</given-names>
            <surname>Torre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. J.</given-names>
            <surname>Pappas</surname>
          </string-name>
          ,
          <article-title>Optimal paths in weighted timed automata</article-title>
          ,
          <source>in: Computation and Control</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ismail</surname>
          </string-name>
          ,
          <article-title>Optimal defense strategies to improve the security and resilience of Smart Grids</article-title>
          , Theses, Télécom ParisTech,
          <year>2016</year>
          . URL: https://pastel.hal.science/tel-03752359.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Löding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rohde</surname>
          </string-name>
          ,
          <article-title>Model checking and satisfiability for sabotage modal logic</article-title>
          ,
          <source>in: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science</source>
          ,
          <year>2003</year>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -24597-1_
          <fpage>26</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -24597-1\_
          <fpage>26</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Catta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leneutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <article-title>Attack graphs &amp; subset sabotage games</article-title>
          ,
          <source>Intelligenza Artificiale</source>
          <volume>17</volume>
          (
          <year>2023</year>
          )
          <fpage>77</fpage>
          -
          <lpage>88</lpage>
          . URL: https://doi.org/10.3233/IA-221080. doi:
          <volume>10</volume>
          .3233/IA-221080.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Arias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Penczek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Petrucci</surname>
          </string-name>
          , T. Sidoruk,
          <article-title>Strategic (timed) computation tree logic</article-title>
          , (
          <year>2023</year>
          ). arXiv:
          <volume>2302</volume>
          .
          <fpage>13405</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Henzinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Prabhu</surname>
          </string-name>
          ,
          <article-title>Timed alternating-time temporal logic</article-title>
          ,
          <source>in: 4th International Conferences on Formal Modelling and Analysis of Timed Systems (FORMATS'06)</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Aminof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kwiatkowska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Maubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rubin</surname>
          </string-name>
          ,
          <article-title>Probabilistic strategy logic</article-title>
          , in: S. Kraus (Ed.),
          <source>Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI</source>
          <year>2019</year>
          , Macao, China,
          <source>August 10-16</source>
          ,
          <year>2019</year>
          ,
          <year>2019</year>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>38</lpage>
          . URL: https://doi.org/ 10.24963/ijcai.
          <year>2019</year>
          /5. doi:
          <volume>10</volume>
          .24963/IJCAI.
          <year>2019</year>
          /5.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <article-title>A logic of probabilistic knowledge and strategy</article-title>
          , in: Proceedings of the 2013 International Conference on Autonomous Agents and
          <string-name>
            <surname>Multi-Agent</surname>
            <given-names>Systems</given-names>
          </string-name>
          , AAMAS '13,
          <string-name>
            <surname>International</surname>
            <given-names>Foundation</given-names>
          </string-name>
          <source>for Autonomous Agents and Multiagent Systems</source>
          , Richland,
          <string-name>
            <surname>SC</surname>
          </string-name>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , T. Chen,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>Probabilistic alternating-time  -calculus</article-title>
          , in
          <source>: Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence</source>
          , AAAI'19/IAAI'19/EAAI'19,
          <year>2019</year>
          . URL: https: //doi.org/10.1609/aaai.v33i01.33016179. doi:
          <volume>10</volume>
          .1609/aaai.v33i01.
          <fpage>33016179</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Belardinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mittelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          ,
          <article-title>Strategic abilities of forgetful agents in stochastic environments</article-title>
          , in: P. Marquis,
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Son</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Kern-Isberner</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 20th International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>KR</source>
          <year>2023</year>
          ,
          <year>2023</year>
          , pp.
          <fpage>726</fpage>
          -
          <lpage>731</lpage>
          . URL: https://doi.org/10.24963/kr.2023/71. doi:
          <volume>10</volume>
          .24963/KR.
          <year>2023</year>
          /71.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <article-title>VITAMIN: A compositional framework for model checking of multiagent systems</article-title>
          ,
          <source>CoRR abs/2403</source>
          .02170 (
          <year>2024</year>
          ). URL: https://doi.org/10.48550/arXiv.2403.02170. doi:
          <volume>10</volume>
          . 48550/ARXIV.2403.02170. arXiv:
          <volume>2403</volume>
          .
          <fpage>02170</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>D.</given-names>
            <surname>Catta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leneutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          ,
          <article-title>Obstruction alternating-time temporal logic: A strategic logic to reason about dynamic models</article-title>
          , in: M.
          <string-name>
            <surname>Dastani</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          <string-name>
            <surname>Sichman</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Alechina</surname>
          </string-name>
          , V. Dignum (Eds.),
          <source>Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS</source>
          <year>2024</year>
          , Auckland, New Zealand, May 6-
          <issue>10</issue>
          ,
          <year>2024</year>
          , International Foundation for Autonomous
          <source>Agents and Multiagent Systems / ACM</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>271</fpage>
          -
          <lpage>280</lpage>
          . URL: https://dl.acm.org/doi/10.5555/3635637.3662875. doi:
          <volume>10</volume>
          .5555/3635637.3662875.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Luongo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          ,
          <article-title>Theory and practice of quantitative atl</article-title>
          , in: R.
          <string-name>
            <surname>Arisaka</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          <string-name>
            <surname>Anguix</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Aydogan</surname>
          </string-name>
          , L. van der Torre, T. Ito (Eds.), PRIMA 2024:
          <article-title>Principles and Practice of Multi-Agent Systems -</article-title>
          25th International Conference, Kyoto, Japan,
          <source>November 18-24</source>
          ,
          <year>2024</year>
          , Proceedings, volume to appear
          <source>of Lecture Notes in Computer Science</source>
          , Springer,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          , Natural strategic ability,
          <source>Artif. Intell</source>
          .
          <volume>277</volume>
          (
          <year>2019</year>
          ). URL: https://doi.org/10.1016/j.artint.
          <year>2019</year>
          .
          <volume>103170</volume>
          . doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2019</year>
          .
          <volume>103170</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>F.</given-names>
            <surname>Belardinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jamroga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mittelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Murano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Perrussel</surname>
          </string-name>
          ,
          <article-title>Reasoning about human-friendly strategies in repeated keyword auctions</article-title>
          ,
          <source>in: AAMAS</source>
          <year>2022</year>
          ,
          <year>2022</year>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Alechina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Logan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rakib</surname>
          </string-name>
          ,
          <article-title>Alternating-time temporal logic with resource bounds</article-title>
          ,
          <source>J. Log. Comput</source>
          .
          <volume>28</volume>
          (
          <year>2018</year>
          )
          <fpage>631</fpage>
          -
          <lpage>663</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malvone</surname>
          </string-name>
          ,
          <article-title>Hands-on VITAMIN: A compositional tool for model checking of</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>