, Ministère des Armées. L'intelligence artificielle au service de la défense, Journal, issue.2, 2019.

, DARPA. Ai next campaign, 2018.

P. Sanders, Algorithm engineering-an attempt at a definition, Efficient Algorithms, pp.321-340, 2009.

M. Leclerc, R. Tharmarasa, and M. Florea, Ship classification using deep learning techniques for maritime target tracking, 21st Int. Conf. on Information Fusion (FUSION), pp.737-744, 2018.

T. Liu, R. Tharmarasa, S. Halle, and M. Florea, Anomaly detection with pattern of life extraction for gmti tracking, 22th Int. Conf. on Information Fusion (FUSION), pp.1-8, 2019.

F. Aligne, P. Savéant, and V. Vidal, Prise en compte d'un contexteévolutif dans la coordination des opérations de secours, IIn Cinquième Workshop Interdisciplinaire sur la Sécurité Globale, 2011.

. Ch, F. Guettier, and . Lucas, A constraint-based approach for planning unmanned aerial vehicle activities, The Knowledge Engineering Review, vol.31, issue.5, p.486, 2016.

M. Muller-hannemann and S. Schirra, Algorithm engineering: bridging the gap between algorithm theory and practice, 2010.

P. Sanders, Algorithm engineering-an attempt at a definition using sorting as an example, 12th Workshop on Algorithm Engineering and Experiments (ALENEX), pp.55-61, 2010.

H. Zhang, T. W. Weng, and P. Y. Chen, Efficient neural network robustness certification with general activation functions, Advances in neural information processing systems, pp.4939-4948, 2018.

L. Weng, P. Y. Chen, L. Nguyen, M. Squillante, A. Boopathy et al., Proven: Verifying robustness of neural networks with a probabilistic approach, Int. Conf. on Machine Learning, pp.6727-6736, 2019.

T. Gehr, M. Mirman, and D. Drachsler-cohen, Ai2: Safety and robustness certification of neural networks with abstract interpretation, 2018 IEEE Symposium on Security and Privacy (SP), pp.3-18, 2018.

G. Katz, D. Huang, D. Ibeling, and K. Julian, The marabou framework for verification and analysis of deep neural networks, Int. Conf. on Computer Aided Verification, pp.443-452, 2019.

M. I. Nicolae, M. Sinn, M. N. Tran, B. Buesser, A. Rawat et al., , 2018.

J. Cohen, E. Rosenfeld, and J. Z. Kolter, Certified adversarial robustness via randomized smoothing, 2019.

S. Mei and X. Zhu, Using machine teaching to identify optimal training-set attacks on machine learners, AAAI Conf. on Artificial Intelligence, 2015.

L. Pipino, Y. Lee, and R. Wang, Data quality assessment, Communications of the ACM, vol.45, issue.4, pp.211-218, 2002.

Y. Huh, F. Keller, T. C. Redman, and A. Watkins, Data quality. Information and software technology, vol.32, pp.559-565, 1990.

R. Studer, V. R. Benjamins, and D. Fensel, Knowledge engineering: principles and methods. Data & knowledge engineering, vol.25, pp.161-197, 1998.

, Guide méthodologique pour la spécification et la qualification des systèmes intégrant des modules d'intelligence artificielle -version 1.0 b, 2019.

E. Denney, G. Pai, and I. Habli, Dynamic safety cases for through-life safety assurance, IEEE/ACM 37th IEEE Int. Conf. on Software Engineering, vol.2, pp.587-590, 2015.