R. Bloem, B. Könighofer, R. Könighofer, and C. Wang, Shield Synthesis:, TACAS, 2015.
DOI : 10.1007/978-3-662-46681-0_51

C. G. Cassandras and S. Lafortune, Introduction to Discrete Event Systems, 2006.

H. Chabot, R. Khoury, and N. Tawbi, Extending the enforcement power of truncation monitors using static analysis, Computers & Security, vol.30, issue.4, pp.194-207, 2011.
DOI : 10.1016/j.cose.2010.11.004

E. Dolzhenko, J. Ligatti, and S. Reddy, Modeling runtime enforcement with mandatory results automata, International Journal of Information Security, vol.206, issue.2???4, pp.47-60, 2015.
DOI : 10.1007/s10207-014-0239-8

Y. Falcone, J. Fernandez, and L. Mounier, Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties, Information Systems Security, pp.41-55, 2008.
DOI : 10.1145/298595.298598

URL : https://hal.archives-ouvertes.fr/hal-00346063

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods in System Design, pp.223-262, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00576948

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

G. R. Malan, D. Watson, F. Jahanian, and P. Howell, Transport and application protocol scrubbing, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1381-1390, 2000.
DOI : 10.1109/INFCOM.2000.832535

T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL ? A Proof Assistant for Higher-Order Logic, LNCS, vol.2283, 2002.

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime enforcement of timed properties revisited. Formal Methods in System Design, pp.381-422, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01088136

G. Rosu, On Safety Properties and Their Monitoring, Scientific Annals of Computer Science, vol.22, issue.2, pp.327-365, 2012.
DOI : 10.7561/SACS.2012.2.327

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

X. Zhang, M. Leucker, and W. Dong, Runtime Verification with Predictive Semantics, NASA Formal Methods -4th International Symposium, pp.418-432, 2012.
DOI : 10.1007/978-3-642-28891-3_37