Previous
Previous

Reasoning about Explanations for Non-validation in SHACL

Next
Next

Towards A Knowledge Graph-based Framework for Integrated Security and Safety Analysis in Digital Production Systems