Inthispaper,weproposetheuseofinteractivetheoremprov- ing for explainable machine learning. After informally motivating our proposition, we illustrate it on the dedicated application of explaining security attacks using the Isabelle Infrastructure framework and its pro- cess of dependability engineering. This formal framework and process provides the logics for specification and modeling. Attacks on security of the system are explained by specification and proofs in the Isabelle Infrastructure framework. Existing case studies of dependability engineering in Isabelle are used as feasibility studies to illustrate how dif- ferent aspects of explanations are covered by the Isabelle Infrastructure framework. Finally, we propose a research agenda ...
A number of current automated protocol verification tools are based on abstract interpretation techn...
Abstract. A number of current automated protocol verification tools are based on abstract interpreta...
The increasing dependence of decision-making on some level of automation has naturally led to discus...
In this paper, we propose the use of interactive the- orem proving for explainable machine learning....
In this paper, we introduce a process of formal system development supported by interactive theorem ...
In this paper, we show a security engineering process based on a formal notion of refinement fully f...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
In this paper, we present a methodology for constructing explanations for AI classification algorith...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
Attack trees are an important modeling formalism to identify and quantify attacks on security and pr...
In this paper, we present a proof theory for attack trees. Attack trees are a well established and u...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
In this article, we present a proof theory for Attack Trees. Attack Trees are a well established and...
In this paper we combine formal modeling and analysis of infrastructures of organisations with socio...
A number of current automated protocol verification tools are based on abstract interpretation techn...
Abstract. A number of current automated protocol verification tools are based on abstract interpreta...
The increasing dependence of decision-making on some level of automation has naturally led to discus...
In this paper, we propose the use of interactive the- orem proving for explainable machine learning....
In this paper, we introduce a process of formal system development supported by interactive theorem ...
In this paper, we show a security engineering process based on a formal notion of refinement fully f...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
In this paper, we present a methodology for constructing explanations for AI classification algorith...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
Attack trees are an important modeling formalism to identify and quantify attacks on security and pr...
In this paper, we present a proof theory for attack trees. Attack trees are a well established and u...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
In this article, we present a proof theory for Attack Trees. Attack Trees are a well established and...
In this paper we combine formal modeling and analysis of infrastructures of organisations with socio...
A number of current automated protocol verification tools are based on abstract interpretation techn...
Abstract. A number of current automated protocol verification tools are based on abstract interpreta...
The increasing dependence of decision-making on some level of automation has naturally led to discus...