R. Alur and D. Dill, The theory of timed automata, Lecture Notes in Computer Science, vol.600, pp.45-73, 1992.
DOI : 10.1007/BFb0031987

E. Bartocci, L. Bortolussi, L. Nenzi, and G. Sanguinetti, System design of stochastic models using robustness of temporal properties, Theoretical Computer Science, vol.587, pp.3-25, 2015.
DOI : 10.1016/j.tcs.2015.02.046

D. Basin, V. Jugé, F. Klaedtke, and E. , Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013.
DOI : 10.1145/2487222.2487225

D. Basin, F. Klaedtke, and E. Zalinescu, Algorithms for Monitoring Real-Time Properties, Proceedings of the 2nd International Conference on Runtime Verification, pp.260-275, 2011.
DOI : 10.1007/978-3-642-29860-8_20

A. K. Bauer and Y. Falcone, Decentralised LTL monitoring, FM 2012: Formal Methods -18th International Symposium, 2012. Proceedings. Lecture Notes in Computer Science, pp.85-100, 2012.
DOI : 10.1007/978-3-642-32759-9_10

URL : https://hal.archives-ouvertes.fr/hal-00857286

R. Bloem, B. Könighofer, R. Könighofer, and C. Wang, Shield Synthesis:, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, TACAS 2015. Proceedings. pp, pp.533-548, 2015.
DOI : 10.1007/978-3-662-46681-0_51

H. Charafeddine, K. El-harake, Y. Falcone, and M. Jaber, Runtime enforcement for component-based systems, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.1789-1796, 2015.
DOI : 10.1145/2695664.2695879

URL : https://hal.archives-ouvertes.fr/hal-01248353

C. Colombo, G. J. Pace, and G. Schneider, LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper), 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009.
DOI : 10.1109/SEFM.2009.13

C. Colombo, G. J. Pace, and G. Schneider, Safe Runtime Verification of Real-Time Properties, Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems, pp.103-117, 2009.
DOI : 10.1016/0020-0190(91)90122-X

A. David, K. G. Larsen, A. Legay, U. Nyman, and A. Wasowski, Timed I/O automata, Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pp.91-100, 2010.
DOI : 10.1145/1755952.1755967

URL : http://vbn.aau.dk/ws/files/58768871/HSCC2010cameraready.pdf

E. Dolzhenko, J. Ligatti, and S. Reddy, Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015.
DOI : 10.1007/s10207-014-0239-8

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Runtime Verification -First International Conference, RV, pp.89-105, 2010.
DOI : 10.1007/978-3-642-16612-9_9

URL : https://hal.archives-ouvertes.fr/hal-00523653

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1007/s10703-011-0114-4

URL : https://hal.archives-ouvertes.fr/hal-00576948

K. G. Larsen, P. Pettersson, and W. Yi, Uppaal in a nutshell, International Journal on Software Tools for Technology Transfer, vol.1, issue.1-2, pp.134-152, 1997.
DOI : 10.1007/s100090050010

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, pp.420-427, 2014.
DOI : 10.3182/20140514-3-FR-4046.00041

URL : https://hal.archives-ouvertes.fr/hal-00974548

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014.
DOI : 10.1145/2554850.2554967

URL : https://hal.archives-ouvertes.fr/hal-00907571

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014.
DOI : 10.1007/s10703-014-0215-y

URL : https://hal.archives-ouvertes.fr/hal-01088136

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime Enforcement of Timed Properties, Third International Conference, RV 2012, Revised Selected Papers, pp.229-244, 2012.
DOI : 10.1007/978-3-642-35632-2_23

URL : https://hal.archives-ouvertes.fr/hal-00743270

U. Sammapun, I. Lee, and O. Sokolsky, RT-MaC: Runtime Monitoring and Checking of Quantitative and Probabilistic Properties, 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'05), pp.147-153, 2005.
DOI : 10.1109/RTCSA.2005.84

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853