The theory of timed automata, Lecture Notes in Computer Science, vol.600, pp.45-73, 1992. ,
DOI : 10.1007/BFb0031987
System design of stochastic models using robustness of temporal properties, Theoretical Computer Science, vol.587, pp.3-25, 2015. ,
DOI : 10.1016/j.tcs.2015.02.046
Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013. ,
DOI : 10.1145/2487222.2487225
Algorithms for Monitoring Real-Time Properties, Proceedings of the 2nd International Conference on Runtime Verification, pp.260-275, 2011. ,
DOI : 10.1007/978-3-642-29860-8_20
Decentralised LTL monitoring, FM 2012: Formal Methods -18th International Symposium, 2012. Proceedings. Lecture Notes in Computer Science, pp.85-100, 2012. ,
DOI : 10.1007/978-3-642-32759-9_10
URL : https://hal.archives-ouvertes.fr/hal-00857286
Shield Synthesis:, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, TACAS 2015. Proceedings. pp, pp.533-548, 2015. ,
DOI : 10.1007/978-3-662-46681-0_51
Runtime enforcement for component-based systems, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.1789-1796, 2015. ,
DOI : 10.1145/2695664.2695879
URL : https://hal.archives-ouvertes.fr/hal-01248353
LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper), 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009. ,
DOI : 10.1109/SEFM.2009.13
Safe Runtime Verification of Real-Time Properties, Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems, pp.103-117, 2009. ,
DOI : 10.1016/0020-0190(91)90122-X
Timed I/O automata, Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pp.91-100, 2010. ,
DOI : 10.1145/1755952.1755967
URL : http://vbn.aau.dk/ws/files/58768871/HSCC2010cameraready.pdf
Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015. ,
DOI : 10.1007/s10207-014-0239-8
You Should Better Enforce Than Verify, Runtime Verification -First International Conference, RV, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-16612-9_9
URL : https://hal.archives-ouvertes.fr/hal-00523653
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1007/s10703-011-0114-4
URL : https://hal.archives-ouvertes.fr/hal-00576948
Uppaal in a nutshell, International Journal on Software Tools for Technology Transfer, vol.1, issue.1-2, pp.134-152, 1997. ,
DOI : 10.1007/s100090050010
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, pp.420-427, 2014. ,
DOI : 10.3182/20140514-3-FR-4046.00041
URL : https://hal.archives-ouvertes.fr/hal-00974548
Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014. ,
DOI : 10.1145/2554850.2554967
URL : https://hal.archives-ouvertes.fr/hal-00907571
Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014. ,
DOI : 10.1007/s10703-014-0215-y
URL : https://hal.archives-ouvertes.fr/hal-01088136
Runtime Enforcement of Timed Properties, Third International Conference, RV 2012, Revised Selected Papers, pp.229-244, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
RT-MaC: Runtime Monitoring and Checking of Quantitative and Probabilistic Properties, 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'05), pp.147-153, 2005. ,
DOI : 10.1109/RTCSA.2005.84
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853