| Practical verification of decision-making in agent-based autonomous systems LA Dennis, M Fisher, NK Lincoln, A Lisitsa, SM Veres Automated Software Engineering 23 (3), 305-359, 2016 | 143 | 2016 |
| A SAT attack on the Erdős discrepancy conjecture B Konev, A Lisitsa International conference on theory and applications of satisfiability …, 2014 | 96 | 2014 |
| An overview of verification and validation challenges for inspection robots M Fisher, RC Cardoso, EC Collins, C Dadswell, LA Dennis, C Dixon, ... Robotics 10 (2), 67, 2021 | 75 | 2021 |
| Computer-aided proof of Erdős discrepancy properties B Konev, A Lisitsa Artificial Intelligence 224, 103-118, 2015 | 63 | 2015 |
| Equality and monodic first-order temporal logic A Degtyarev, M Fisher, A Lisitsa Studia Logica 72 (2), 147-156, 2002 | 58 | 2002 |
| Penetration testing for internet of things and its automation G Chu, A Lisitsa 2018 IEEE 20th International Conference on High Performance Computing and …, 2018 | 53 | 2018 |
| Reachability analysis in verification via supercompilation A Lisitsa, AP Nemytykh International Journal of Foundations of Computer Science 19 (04), 953-969, 2008 | 52 | 2008 |
| Verification as a parameterized testing (experiments with the SCP4 supercompiler) AP Lisitsa, AP Nemytykh Programming and Computer Software 33 (1), 14-23, 2007 | 47 | 2007 |
| Temporal logic with predicate/spl lambda/-abstraction A Lisitsa, I Potapov 12th International Symposium on Temporal Representation and Reasoning (TIME …, 2005 | 42 | 2005 |
| A misuse-based network intrusion detection system using temporal logic and stream processing A Ahmed, A Lisitsa, C Dixon 2011 5th International Conference on Network and System Security, 1-8, 2011 | 36 | 2011 |
| Linear ordering on graphs, anti-founded sets and polynomial time computability A Lisitsa, V Sazonov Theoretical Computer Science 224 (1-2), 173-213, 1999 | 34 | 1999 |
| Predicting plant Rubisco kinetics from RbcL sequence data using machine learning WA Iqbal, A Lisitsa, MV Kapralov Journal of Experimental Botany 74 (2), 638-650, 2023 | 32 | 2023 |
| Satellite control using rational agent programming L Dennis, M Fisher, A Lisitsa, N Lincoln, S Veres IEEE Intelligent Systems 25 (3), 92-97, 2010 | 32 | 2010 |
| Poster: Agent-based (BDI) modeling for automation of penetration testing G Chu, A Lisitsa 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-2, 2018 | 29 | 2018 |
| Autonomous asteroid exploration by rational agents NK Lincoln, SM Veres, LA Dennis, M Fisher, A Lisitsa ieee ComputatioNal iNtelligeNCe magaziNe 8 (4), 25-38, 2013 | 29 | 2013 |
| A re-evaluation of intrusion detection accuracy: Alternative evaluation strategy S Al-Riyami, F Coenen, A Lisitsa Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 27 | 2018 |
| Bounded hyperset theory and web-like data bases A Lisitsa, V Sazonov Kurt Gödel Colloquium on Computational Logic and Proof Theory, 172-185, 1997 | 27 | 1997 |
| An agent based framework for adaptive control and decision making of autonomous vehicles L Dennis, M Fisher, NK Lincoln, SM Veres, A Lisitsa IFAC Proceedings Volumes 43 (10), 310-317, 2010 | 26 | 2010 |
| Practical infinite-state verification with temporal reasoning M Fisher, B Konev, A Lisitsa NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION …, 2006 | 24 | 2006 |
| A combinatorial approach to knot recognition A Fish, A Lisitsa, D Stanovský Workshop on Embracing Global Computing in Emerging Economies, 64-78, 2015 | 23 | 2015 |