Enforceable security policies, ACM Trans. Inf. Syst. Secur, vol.3, issue.1, 2000. ,
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-19, 2009. ,
DOI : 10.1145/1455526.1455532
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1007/s10703-011-0114-4
URL : https://hal.archives-ouvertes.fr/hal-00576948
Runtime Enforcement of Timed Properties, Proceedings of the Third International Con- 1330 ference on Runtime Verification, pp.229-244, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
Strato: A retargetable framework for low-level inlined-reference monitors, Proceedings of the 22th USENIX Security Symposium 1335 [7] ´ U. Erlingsson, F. B. Schneider, IRM enforcement of Java stack inspection IEEE Symposium on Security and Privacy, pp.369-382, 2000. ,
Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, WODES 2014, pp.420-427, 1340. ,
DOI : 10.3182/20140514-3-FR-4046.00041
URL : https://hal.archives-ouvertes.fr/hal-00974548
Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014. ,
DOI : 10.1145/2554850.2554967
URL : https://hal.archives-ouvertes.fr/hal-00907571
What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012. ,
DOI : 10.1007/s10009-011-0196-8
URL : https://hal.archives-ouvertes.fr/hal-00497350
A theory of timed automata, Theoretical Comp, Science, vol.126, issue.94, pp.183-235, 1994. ,
Timed Automata: Semantics, Algorithms and Tools, Lectures on Concurrency and Petri Nets, Advances in Petri Nets, pp.87-124, 2003. ,
DOI : 10.1007/978-3-540-27755-2_3
Symbolic model checking for real-time systems, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science, pp.1355-193, 1994. ,
DOI : 10.1109/LICS.1992.185551
Event-clock automata: a determinizable class of timed automata, Theoretical Computer Science, vol.211, issue.1-2, pp.253-273, 1999. ,
DOI : 10.1016/S0304-3975(97)00173-4
Timed Automata: Semantics, Algorithms and Tools, Proceedings of the 4th Advanced Course on Petri Nets -Lecture Notes on Concurrency and Petri Nets, pp.87-124, 2003. ,
DOI : 10.1007/978-3-540-27755-2_3
From MTL to deterministic timed automata, Proceedings of the 8th International Conference on Formal Modelling and Analysis of Timed Systems, p.1375, 2010. ,
On the optimal reachability problem of weighted timed automata, Formal Methods in System Design, pp.135-175, 2007. ,
TiPEX: A tool chain for timed property en- 1380 forcement during execution, pp.306-320 ,
Patterns for timed property specifications, Electronic Notes in Theoretical 1385, Computer Science, vol.153, issue.2, pp.117-133, 2006. ,
Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014. ,
DOI : 10.1007/s10703-014-0215-y
URL : https://hal.archives-ouvertes.fr/hal-01088136
Synthesizing Monitors for Safety Properties, p.1390 ,
DOI : 10.1007/3-540-46002-0_24
Verify Your Runs, Verified Software, p.1395 ,
DOI : 10.1007/11494881_14
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.1400-293, 2009. ,
DOI : 10.1016/j.jlap.2008.08.004
Introduction to the special section on runtime verification, International Journal on Software Tools for Technology Transfer, vol.32, issue.1, pp.243-247, 2012. ,
DOI : 10.1007/s10009-011-0218-6
A tutorial on runtime verification, Engineering Dependable Software Systems of NATO Science for Peace 1405 and Security Series, D: Information and Communication Security, pp.141-175, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853727
The simplex architecture for safe online control system upgrades Sandboxing controllers for cyber-physical systems, American Control Conference Proceedings of the 1998 IEEE/ACM International Conference on Cyber-Physical Systems, ICCPS 2011, pp.3504-3508, 1998. ,
Using run-time checking to provide safety and 1415 progress for distributed cyber-physical systems, IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2013, pp.2013-287, 2013. ,
Modelplex: Verified runtime validation of verified cyber-physical system models, Bonakdarpour and Smolka [55], pp.199-214 ,
Fast-Forward Runtime Monitoring ??? An Industrial Case Study, Third International Conference Mantel, Scalable offline monitoring Bonakdarpour and Smolka [55], pp.214-228, 1007. ,
DOI : 10.1007/978-3-642-35632-2_22
Monitoring Electronic Exams, pp.118-135 ,
DOI : 10.1007/978-3-319-23820-3_8
URL : https://hal.archives-ouvertes.fr/hal-01248349
Monitoring distributed real-time systems: A survey and future direc- 1430 tions, 2010. ,
Run-Time Checking of Dynamic Properties, Electronic Notes in Theoretical Computer Science, vol.144, issue.4, 2006. ,
DOI : 10.1016/j.entcs.2006.02.006
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4 ,
DOI : 10.1145/2000799.2000800
Monitoring Algorithms for Metric Temporal Logic Specifications, Electronic Notes in Theoretical Computer Science, vol.113, pp.145-162, 2005. ,
DOI : 10.1016/j.entcs.2004.01.029
Algorithms for monitoring real-time properties, in: Khur- 1440 shid and Sen, pp.260-275 ,
Runtime monitoring and checking of quantitative and probabilistic properties: a property-based monitoring tool for analog systems, IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications 0, pp.147-153, 2005. ,
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties, FMICS Revised Selected Papers Lecture Notes in Computer Science, vol.24, issue.2, pp.135-149, 2008. ,
DOI : 10.1023/B:FORM.0000017719.43755.7c
LARVA ? safer monitoring of real-time Java programs 1455 (tool paper, Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009. ,
You Should Better Enforce Than Verify, Proceedings of the 1460 ,
DOI : 10.1007/978-3-642-16612-9_9
URL : https://hal.archives-ouvertes.fr/hal-00523653
Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011. ,
DOI : 10.1007/s10207-011-0137-2
Runtime Verification with the RV System, p.1465 ,
DOI : 10.1007/978-3-642-16612-9_12
Runtime Verification -First International Conference, Proceedings Lecture Notes in Computer Science, vol.6418, pp.136-152, 2010. ,
Safer asynchronous runtime monitoring using compensations, Formal Methods in System Design, vol.5474, issue.2, pp.269-294, 2012. ,
DOI : 10.1007/s10703-012-0142-8
Enforceable security policies revisited, ACM Trans. Inf. Syst. Secur, vol.16, issue.1 ,
Computational Analysis of Run-time Monitoring, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.80-94, 2002. ,
DOI : 10.1016/S1571-0661(04)80578-4
PSL Model Checking and Run-Time Verification Via Testers, FM 2006: Formal Methods, 14th International Symposium on Formal Methods Proceedings of Lecture Notes in 1480 Computer Science, pp.573-58610, 1007. ,
DOI : 10.1007/11813040_38
Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State, pp.276-293 ,
DOI : 10.1007/978-3-642-29860-8_21
Foundations for the run-time monitoring of reactive systems -Fundamentals of the MaC language, Proceedings of the First International Colloquium on Theoretical Aspects of Computing Runtime Verification -5th International Conference. Proceedings, pp.327-365, 1007. ,