<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">An ASP-based Approach to Network Security in Urban Air Mobility</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Gioacchino</forename><surname>Sterlicchio</surname></persName>
							<email>g.sterlicchio@phd.poliba.it</email>
							<affiliation key="aff0">
								<orgName type="department">DMMM</orgName>
								<orgName type="institution">Polytechnic University of Bari</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesca</forename><forename type="middle">Alessandra</forename><surname>Lisi</surname></persName>
							<email>francescaalessandra.lisi@uniba.it</email>
							<affiliation key="aff1">
								<orgName type="department">DIB and CILA</orgName>
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">An ASP-based Approach to Network Security in Urban Air Mobility</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B03F3BFFCAF08C3A663E1C0818D914FE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Answer Set Programming</term>
					<term>Contrast Sequential Pattern Mining</term>
					<term>Network Security</term>
					<term>Urban Air Mobility</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this discussion paper, we briefly describe a novel approach to network security, accepted for presentation at ECAI 2024. The approach leverages Answer Set Programming (ASP) for finding contrast sequential patterns that characterize different attacks on the 4G-LTE network in the context of Urban Air Mobility. The experiments show that an ASP-based declarative approach is feasible in this context, and that the implementation of span and gap constraints in the sequence mining phase makes the search for patterns more efficient and effective.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Urban Air Mobility (UAM) is a new air transportation system for passengers and cargo in urban environments performed by electric aircraft that take-off and land vertically <ref type="bibr" target="#b0">[1]</ref>. UAM has a complex ecosystem which makes it vulnerable to cyber-threats putting network security of transportation system at risk <ref type="bibr" target="#b1">[2]</ref>. Cellular-connected UAV <ref type="bibr" target="#b2">[3]</ref> is a promising technology to achieve the essential UAM requirements of high-capacity, low-latency and ultra-reliable wireless communications between UAVs and their associated ground entities. 4G long-term evolution (LTE) is an example and can be used together by unmanned aerial system traffic management (UTM) and Automatic Dependent Surveillance Broadcast (ADS-B) ensuring safety and security of the UAV operation <ref type="bibr" target="#b3">[4]</ref>. However security threats could lead to a loss of confidentiality (e.g. access and disclosure of restricted information), integrity (e.g. message tampering, service supplier spoofing), or availability (e.g. reliability of GPS) of the data exchanged or stored across the UAM ecosystem <ref type="bibr" target="#b4">[5]</ref>.</p><p>Network security is a field of application for pattern mining algorithms. Buczak et al. <ref type="bibr" target="#b5">[6]</ref> survey methods of machine learning and data mining that can be successfully applied to intrusion detection. Sequence mining is one of them. Li et al. <ref type="bibr" target="#b6">[7]</ref> use sequential pattern mining in real time to find out the frequency and sequence features of multi-stage attacks. In <ref type="bibr" target="#b7">[8]</ref>, the authors construct attack graph from transaction database using sequential pattern mining. Husák et al. <ref type="bibr" target="#b8">[9]</ref> use sequential pattern mining and rule mining in the analysis of cyber security alert sharing SABU. Whereas sequence mining is widely explored in network security, the Contrast Sequential Pattern Mining (CSPM) task <ref type="bibr" target="#b9">[10]</ref> has not been addressed so far in this application domain to the best of our knowledge. In this discussion paper, we address the problem of detecting patterns of attacks to 4G-LTE network security in UAM by relying on the CSPM task.</p><p>Our approach, described in depth in a paper accepted for presentation at ECAI 2024 <ref type="bibr" target="#b10">[11]</ref>, leverages the declarative framework of Answer Set Programming (ASP) <ref type="bibr" target="#b11">[12]</ref>, thus positioning in the research stream called Declarative Pattern Mining (DPM). The first proposal of an ASP-based approach to sequence mining is described by Guyet et al. <ref type="bibr" target="#b12">[13]</ref> and compared with a dedicated algorithm. Gebser et al. <ref type="bibr" target="#b13">[14]</ref>  use ASP for extracting condensed representations of sequential patterns. Guyet et al. <ref type="bibr" target="#b14">[15]</ref> introduce ASP encodings for two representations of embeddings (fill-gaps vs skip-gaps) in sequence mining. Lisi and Sterlicchio present the first ASP encoding for the CSPM problem in <ref type="bibr" target="#b15">[16]</ref> which we will refer to as Mining with Answer Set Solving -Contrast Sequential Patterns (MASS-CSP) hereafter. To address the challenges of DPM in the context of network security, in <ref type="bibr" target="#b10">[11]</ref> we have improved the efficiency and the effectiveness of the sequence mining phase in MASS-CSP by adding span and gap constraints.</p><p>The paper is organized as follows. In Section 2 and 3 we briefly describe our ASP-based approach to the problem in hand, and report some experimental results obtained on sets of traces for two kinds of attacks. Section 4 concludes the paper with final remarks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Approach</head><p>We start with a couple of observations about the limits of MASS-CSP. For illustrative purposes, let us consider the pattern ⟨𝑎, 𝑏⟩ and the sequences ⟨𝑎, 𝑏, 𝑐⟩ and ⟨𝑎, 𝑐, 𝑐, 𝑏⟩. First, they do not deal with the number of gaps between one embedding and another. In other words, two consecutive items of a sequential pattern can be 𝑛 gaps apart within a sequence, in the example 0 and 2 respectively. Secondly, ⟨𝑎, 𝑏⟩ has support in both sequences but with different span, namely 1 and 3 respectively. Our work develops on the basis of these two observations because in various application domains, patterns that reflect certain characteristics are more informative. In <ref type="bibr" target="#b16">[17]</ref> there were defined many types of constraints on patterns and embeddings for sequence mining, among which the ones based on the notion of gap and span that are detailed below.</p><p>The span constraint specifies the minimum/maximum length allowed for a sequential pattern. As illustrated in Figure <ref type="figure" target="#fig_0">1</ref>, it is the difference between its last item timestamp that is 8 and its first item timestamp, i.e. 3, and thus ⟨𝑎, 𝑏, 𝑐⟩ has span 5 in that sequence. It requires that the pattern duration should be longer or shorter than a given time period. By setting a span constraint, we can focus on identifying shorter or longer sequences of events based on our specific requirements. The gap constraint controls the minimum/maximum gap allowed between consecutive occurrences of items within a sequence. In Figure <ref type="figure" target="#fig_0">1</ref>, the gap between 𝑎 and 𝑏 is 1 while 2 between 𝑏 and 𝑐. It specifies how many time units may intervene before an item is observed again. Gap constraints are essential for capturing temporal relationships between events. Setting appropriate gap values helps identify patterns where there might be delays or interruptions between related events but still maintain their significance.</p><p>According to <ref type="bibr" target="#b14">[15]</ref>, we have encoded these constraints as choices rules instead of using ASP denials, thus implementing them in the generate stage for pruning the search space earlier. The full encoding with other details can be found in <ref type="bibr" target="#b17">[18]</ref>. The result is an increase in efficiency and effectiveness of the final output as described in the following section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Evaluation</head><p>CSPM can be particularly useful to 4G-LTE for different reasons, e.g., optimizing network performance by analyzing contrast patterns and making informed decisions on network configurations, resource allocations, and traffic management strategies and ensuring quality of services requirements. Since our focus is on security, anomalies or unusual behavior in the network traffic can be detected by mining contrast sequential patterns, thus helping in identifying potential security threats. Contrast sequential patterns are those that characterize normal and attack behaviour given different traces. Our work considers a couple of attacks -namely authentication failure attack and the numb attack <ref type="bibr" target="#b18">[19]</ref> -as a case study and we used the traces made available by <ref type="bibr" target="#b19">[20]</ref> <ref type="foot" target="#foot_0">1</ref> . Listing 1 shows example patterns for both attacks. More precisely they are the longest contrast sequential patterns found having 30% support across all sequences. They describe the timeline of events that leads to the attack. Interestingly, both attacks share common behavior with the exception of the authentication_failure event that occurs always in subsequence ⟨. . . ,authentication_request, authetication_failure, authentication_request, . . . ⟩ in (a) but not in (b). ( a ) &lt; a t t a c h _ r e q u e s t , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ f a i l u r e , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ r e s p o n s e , security_mode_command , s e c u r i t y _ m o d e _ c o m p l e t e , a t t a c h _ a c c e p t , a t t a c h _ c o m p l e t e , d e t a c h _ r e q u e s t , d e t a c h _ a c c e p t , a t t a c h _ r e q u e s t , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ f a i l u r e , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ r e s p o n s e , security_mode_command , s e c u r i t y _ m o d e _ c o m p l e t e , a t t a c h _ a c c e p t , a t t a c h _ c o m p l e t e , d e t a c h _ r e q u e s t , d e t a c h _ a c c e p t &gt; ( b ) &lt; a t t a c h _ r e q u e s t , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ r e s p o n s e , security_mode_command , s e c u r i t y _ m o d e _ c o m p l e t e , a t t a c h _ a c c e p t , a t t a c h _ c o m p l e t e , d e t a c h _ r e q u e s t , d e t a c h _ a c c e p t , a t t a c h _ r e q u e s t , a u t h e n t i c a t i o n _ r e q u e s t , a u t h e n t i c a t i o n _ r e s p o n s e , security_mode_command , s e c u r i t y _ m o d e _ c o m p l e t e , a t t a c h _ a c c e p t , a t t a c h _ c o m p l e t e &gt;</p><p>The main goal is to show the feasibility of a declarative approach to CSPM in the context of network security. Also, experiments have been designed in order to provide a comparative evaluation between the basic ASP encoding reported in <ref type="bibr" target="#b15">[16]</ref> and the ASP encodings proposed that implement the span/gap constraints. We empirically show what are the advantages of adding new constraints on pattern embeddings. Figure <ref type="figure" target="#fig_2">2</ref> makes a comparison between the basic ASP encoding (dotted lines) and the improved one with the span/gap constraints (continuous lines) that for space reasons we only report the authentication failure attack. First, with the gap constraint we have control over the type of pattern we want thanks to the minimum and maximum gap. The pattern output set is considerably reduced, extracting only those actually useful for our purpose with an advantage on time and memory as we act directly in the pattern generation phase, having a smaller ground program than the previous one. Using the span constraint, we are able to reduce the number of patterns and the execution time without memory improvement. The gap constraint is the one that brings the best advantages in terms of overall performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>This discussion paper addresses the problem of detecting attack patterns to the network security in the context of UAM, and focuses on a couple of attacks to 4G LTE, namely the authentication failure and the numb attack. We have suggested that CSPM can be helpful and presented an ASP-based approach to mine contrast sequential patterns from 4G-LTE traces characterizing normal and attack behavior for different types of attacks. The patterns found with our approach may be useful for post-attack analysis in order to understand the steps of the immediate attack and implement defensive mechanisms. Experiments have shown that applying a declarative approach is feasible. Also, results have highlighted the benefits of adding constraints to embeddings. In particular, the span and gap constraints allow pruning the set of patterns found, thus decreasing the memory consumption and the execution time. Finally, since the only input is the set of execution traces, the approach applies also to other attacks on the same network or even on other networks such as 5G.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Illustration of the gap and span notions.</figDesc><graphic coords="2,241.23,65.61,112.82,133.78" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Listing 1 :</head><label>1</label><figDesc>Examples of longer attack patterns found with 30% support in (a) Auth_Failure_40 and (b) Numb_Attack_40</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Comparison as regards number of patterns (log scale), execution time, and memory consumption between the basic ASP encoding and the encodings with gap (a-c), span (d-f) constraints on the datasets Auth_Failure with mingap=0, maxgap=0, minspan=1, maxspan=10 minlen=2, and maxlen=6.</figDesc><graphic coords="4,77.98,211.13,148.93,118.03" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://github.com/CLC-UIowa/SySLite</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was partially supported by the project FAIR -Future AI Research (PE00000013), under the NRRP MUR program funded by the NextGenerationEU.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Pak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Asmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kokus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">I</forename><surname>Schuchardt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>End</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Meller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Schweiger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Torens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Barzantny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Ernst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Jäger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Laudien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Naeem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Papenfuß</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pertz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shiva Prakasha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ratei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Reimer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sieb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhu</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2309.12680</idno>
		<idno type="arXiv">arXiv:2309.12680</idno>
		<idno>arXiv:2309.12680</idno>
		<title level="m">Can Urban Air Mobility become reality? Opportunities, challenges and selected research results</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Systematic evaluation of cybersecurity risks in the Urban Air Mobility operational environment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jordan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>Jaskowska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Monsalve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rozenblat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Freeman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Garcia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2022 Integrated Communication, Navigation and Surveillance Conference (ICNS), IEEE</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Cellular-Connected UAV: Potential, challenges, and promising technologies</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lyu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Wireless Communications</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="120" to="127" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">UAS traffic management communications: The legacy of ADS-B, new establishment of remote ID, or leverage of ADS-B-Like systems?</title>
		<author>
			<persName><forename type="first">N</forename><surname>Ruseno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-Y</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-C</forename><surname>Chang</surname></persName>
		</author>
		<idno type="DOI">10.3390/drones6030057</idno>
		<ptr target="https://www.mdpi.com/2504-446X/6/3/57.doi:10.3390/drones6030057" />
	</analytic>
	<monogr>
		<title level="j">Drones</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">An interface-based cybersecurity subsystem analysis on a small unmanned aerial systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ippolito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Krishnakumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AIAA SciTech</title>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A survey of data mining and machine learning methods for cyber security intrusion detection</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Buczak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Guven</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications surveys &amp; tutorials</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="1153" to="1176" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Real-time correlation of network security alerts</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on e-Business Engineering (ICEBE&apos;07)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="73" to="80" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Using network attack graph to predict the future attacks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z.-T</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2007 Second International Conference on Communications and Networking in China</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="403" to="407" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On the sequential pattern and rule mining in the analysis of cyber security alerts</title>
		<author>
			<persName><forename type="first">M</forename><surname>Husák</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kašpar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bou-Harb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Čeleda</surname></persName>
		</author>
		<idno type="DOI">10.1145/3098954.3098981</idno>
		<idno>doi:10.1145/3098954.3098981</idno>
		<ptr target="https://doi.org/10.1145/3098954.3098981" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES &apos;17</title>
				<meeting>the 12th International Conference on Availability, Reliability and Security, ARES &apos;17<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Gan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2209.13556</idno>
		<title level="m">Contrast pattern mining: A survey</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Detecting patterns of attacks to network security in urban air mobility with answer set programming</title>
		<author>
			<persName><forename type="first">G</forename><surname>Sterlicchio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Lisi</surname></persName>
		</author>
		<idno type="DOI">10.3233/FAIA240626</idno>
		<ptr target="https://doi.org/10.3233/FAIA240626.doi:10.3233/FAIA240626" />
	</analytic>
	<monogr>
		<title level="m">-Including 13th Conference on Prestigious Applications of Intelligent Systems (PAIS 2024)</title>
				<editor>
			<persName><forename type="first">U</forename><surname>Endriss</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><forename type="middle">S</forename><surname>Melo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Bach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">J B</forename><surname>Diz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Alonso-Moral</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Barro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Heintz</surname></persName>
		</editor>
		<meeting><address><addrLine>Santiago de Compostela, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2024-10-24">19-24 October 2024. 2024</date>
			<biblScope unit="volume">392</biblScope>
			<biblScope unit="page" from="1285" to="1292" />
		</imprint>
	</monogr>
	<note>Frontiers in Artificial Intelligence and Applications</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Answer sets and the language of answer set programming</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lifschitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Magazine</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="7" to="12" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Guyet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Moinard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Quiniou</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1409.7777</idno>
		<title level="m">Using answer set programming for pattern mining</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Knowledge-based sequence mining with ASP</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Guyet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Quiniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Romero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IJCAI 2016-25th International joint conference on artificial intelligence</title>
				<imprint>
			<publisher>AAAI</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page">8</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Efficiency analysis of ASP encodings for sequential pattern mining tasks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Guyet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Moinard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Quiniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Knowledge Discovery and Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="41" to="81" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Mining contrast sequential patterns with ASP</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Lisi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sterlicchio</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-47546-7_4</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-031-47546-7\_4" />
	</analytic>
	<monogr>
		<title level="m">AIxIA 2023 -Advances in Artificial Intelligence -XXI-Ind International Conference of the Italian Association for Artificial Intelligence, AIxIA 2023</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">R</forename><surname>Basili</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Lembo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Limongelli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Orlandini</surname></persName>
		</editor>
		<meeting><address><addrLine>Rome, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">November 6-9, 2023. 2023</date>
			<biblScope unit="volume">14318</biblScope>
			<biblScope unit="page" from="44" to="57" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Constraint-based sequential pattern mining: the pattern-growth methods</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Intelligent Information Systems</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="133" to="160" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Detecting Patterns of Attacks to Network Security in Urban Air Mobility with Answer Set Programming</title>
		<author>
			<persName><forename type="first">G</forename><surname>Sterlicchio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Lisi</surname></persName>
		</author>
		<idno type="DOI">10.5281/zenodo.13135192</idno>
		<ptr target="https://doi.org/10.5281/zenodo.13135192.doi:10.5281/zenodo.13135192" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">LTEInspector: A systematic approach for adversarial testing of 4g LTE</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Chowdhury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mehnaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</author>
		<ptr target="https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_02A-3_Hussain_paper.pdf" />
	</analytic>
	<monogr>
		<title level="m">25th Annual Network and Distributed System Security Symposium, NDSS 2018</title>
				<meeting><address><addrLine>San Diego, California, USA</addrLine></address></meeting>
		<imprint>
			<publisher>The Internet Society</publisher>
			<date type="published" when="2018">February 18-21, 2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Syslite: Syntax-guided synthesis of PLTL formulas from finite traces</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Arif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Larraz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Echeverria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Reynolds</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Chowdhury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tinelli</surname></persName>
		</author>
		<idno type="DOI">10.34727/2020/isbn.978-3-85448-042-6_16</idno>
	</analytic>
	<monogr>
		<title level="m">Formal Methods in Computer Aided Design (FMCAD)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="93" to="103" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
