F. B. Schneider, Enforceable security policies, ACM Trans. Inf. Syst. Secur, vol.3, issue.1, 2000.

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-19, 2009.
DOI : 10.1145/1455526.1455532

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1007/s10703-011-0114-4

URL : https://hal.archives-ouvertes.fr/hal-00576948

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime Enforcement of Timed Properties, Proceedings of the Third International Con- 1330 ference on Runtime Verification, pp.229-244, 2012.
DOI : 10.1007/978-3-642-35632-2_23

URL : https://hal.archives-ouvertes.fr/hal-00743270

B. Zeng, G. Tan, and ´. U. Erlingsson, Strato: A retargetable framework for low-level inlined-reference monitors, Proceedings of the 22th USENIX Security Symposium 1335 [7] ´ U. Erlingsson, F. B. Schneider, IRM enforcement of Java stack inspection IEEE Symposium on Security and Privacy, pp.369-382, 2000.

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, J. Lesage et al., Runtime Enforcement of Parametric Timed Properties with Practical Applications, 12th International Workshop on Discrete Event Systems, WODES 2014, pp.420-427, 1340.
DOI : 10.3182/20140514-3-FR-4046.00041

URL : https://hal.archives-ouvertes.fr/hal-00974548

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, Runtime enforcement of regular timed properties, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1279-1286, 2014.
DOI : 10.1145/2554850.2554967

URL : https://hal.archives-ouvertes.fr/hal-00907571

Y. Falcone, J. Fernandez, and L. Mounier, What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012.
DOI : 10.1007/s10009-011-0196-8

URL : https://hal.archives-ouvertes.fr/hal-00497350

R. Alur and D. L. Dill, A theory of timed automata, Theoretical Comp, Science, vol.126, issue.94, pp.183-235, 1994.

J. Bengtsson and W. Yi, Timed Automata: Semantics, Algorithms and Tools, Lectures on Concurrency and Petri Nets, Advances in Petri Nets, pp.87-124, 2003.
DOI : 10.1007/978-3-540-27755-2_3

T. A. Henzinger, X. Nicollin, J. Sifakis, and S. Yovine, Symbolic model checking for real-time systems, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science, pp.1355-193, 1994.
DOI : 10.1109/LICS.1992.185551

R. Alur, L. Fix, and T. A. Henzinger, Event-clock automata: a determinizable class of timed automata, Theoretical Computer Science, vol.211, issue.1-2, pp.253-273, 1999.
DOI : 10.1016/S0304-3975(97)00173-4

J. Bengtsson and W. Yi, Timed Automata: Semantics, Algorithms and Tools, Proceedings of the 4th Advanced Course on Petri Nets -Lecture Notes on Concurrency and Petri Nets, pp.87-124, 2003.
DOI : 10.1007/978-3-540-27755-2_3

D. Nickovic and N. Piterman, From MTL to deterministic timed automata, Proceedings of the 8th International Conference on Formal Modelling and Analysis of Timed Systems, p.1375, 2010.

P. Bouyer, T. Brihaye, V. Bruyère, and J. Raskin, On the optimal reachability problem of weighted timed automata, Formal Methods in System Design, pp.135-175, 2007.

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, TiPEX: A tool chain for timed property en- 1380 forcement during execution, pp.306-320

V. Gruhn and R. Laue, Patterns for timed property specifications, Electronic Notes in Theoretical 1385, Computer Science, vol.153, issue.2, pp.117-133, 2006.

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014.
DOI : 10.1007/s10703-014-0215-y

URL : https://hal.archives-ouvertes.fr/hal-01088136

K. Havelund and G. Rosu, Synthesizing Monitors for Safety Properties, p.1390
DOI : 10.1007/3-540-46002-0_24

K. Havelund and A. Goldberg, Verify Your Runs, Verified Software, p.1395
DOI : 10.1007/11494881_14

M. Leucker and C. Schallhart, A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.1400-293, 2009.
DOI : 10.1016/j.jlap.2008.08.004

O. Sokolsky, K. Havelund, and I. Lee, Introduction to the special section on runtime verification, International Journal on Software Tools for Technology Transfer, vol.32, issue.1, pp.243-247, 2012.
DOI : 10.1007/s10009-011-0218-6

Y. Falcone, K. Havelund, and G. Reger, A tutorial on runtime verification, Engineering Dependable Software Systems of NATO Science for Peace 1405 and Security Series, D: Information and Communication Security, pp.141-175, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853727

D. Seto, B. Krogh, L. Sha, A. Chutinan, S. Bak et al., The simplex architecture for safe online control system upgrades Sandboxing controllers for cyber-physical systems, American Control Conference Proceedings of the 1998 IEEE/ACM International Conference on Cyber-Physical Systems, ICCPS 2011, pp.3504-3508, 1998.

S. Bak, F. A. Abad, Z. Huang, and M. Caccamo, Using run-time checking to provide safety and 1415 progress for distributed cyber-physical systems, IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2013, pp.2013-287, 2013.

S. Mitsch and A. Platzer, Modelplex: Verified runtime validation of verified cyber-physical system models, Bonakdarpour and Smolka [55], pp.199-214

C. Colombo, G. J. Pace, G. Caronni, S. Ereth, M. Harvan et al., Fast-Forward Runtime Monitoring ??? An Industrial Case Study, Third International Conference Mantel, Scalable offline monitoring Bonakdarpour and Smolka [55], pp.214-228, 1007.
DOI : 10.1007/978-3-642-35632-2_22

A. Kassem, Y. Falcone, and P. Lafourcade, Monitoring Electronic Exams, pp.118-135
DOI : 10.1007/978-3-319-23820-3_8

URL : https://hal.archives-ouvertes.fr/hal-01248349

A. Goodloe and L. Pike, Monitoring distributed real-time systems: A survey and future direc- 1430 tions, 2010.

O. Sokolsky, U. Sammapun, I. Lee, and J. Kim, Run-Time Checking of Dynamic Properties, Electronic Notes in Theoretical Computer Science, vol.144, issue.4, 2006.
DOI : 10.1016/j.entcs.2006.02.006

A. Bauer, M. Leucker, and C. Schallhart, Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4
DOI : 10.1145/2000799.2000800

P. Thati and G. Rosu, Monitoring Algorithms for Metric Temporal Logic Specifications, Electronic Notes in Theoretical Computer Science, vol.113, pp.145-162, 2005.
DOI : 10.1016/j.entcs.2004.01.029

D. A. Basin, F. Klaedtke, and E. Zalinescu, Algorithms for monitoring real-time properties, in: Khur- 1440 shid and Sen, pp.260-275

U. Sammapun, I. Lee, O. Sokolsky, and . Rt-mac, Runtime monitoring and checking of quantitative and probabilistic properties: a property-based monitoring tool for analog systems, IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications 0, pp.147-153, 2005.

C. Colombo, G. J. Pace, and G. Schneider, Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties, FMICS Revised Selected Papers Lecture Notes in Computer Science, vol.24, issue.2, pp.135-149, 2008.
DOI : 10.1023/B:FORM.0000017719.43755.7c

C. Colombo, G. J. Pace, and G. Schneider, LARVA ? safer monitoring of real-time Java programs 1455 (tool paper, Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods, pp.33-37, 2009.

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Proceedings of the 1460
DOI : 10.1007/978-3-642-16612-9_9

URL : https://hal.archives-ouvertes.fr/hal-00523653

N. Bielova and F. Massacci, Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011.
DOI : 10.1007/s10207-011-0137-2

P. O. Meredith and G. Rosu, Runtime Verification with the RV System, p.1465
DOI : 10.1007/978-3-642-16612-9_12

B. Finkbeiner, K. Havelund, I. Lee, G. J. Pace, G. Rosu et al., Runtime Verification -First International Conference, Proceedings Lecture Notes in Computer Science, vol.6418, pp.136-152, 2010.

C. Colombo, G. J. Pace, and P. Abela, Safer asynchronous runtime monitoring using compensations, Formal Methods in System Design, vol.5474, issue.2, pp.269-294, 2012.
DOI : 10.1007/s10703-012-0142-8

D. A. Basin, V. Jugé, F. Klaedtke, and E. Zalinescu, Enforceable security policies revisited, ACM Trans. Inf. Syst. Secur, vol.16, issue.1

M. Kim, S. Kannan, I. Lee, O. Sokolsky, and M. Viswanathan, Computational Analysis of Run-time Monitoring, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.80-94, 2002.
DOI : 10.1016/S1571-0661(04)80578-4

A. Pnueli and A. Zaks, PSL Model Checking and Run-Time Verification Via Testers, FM 2006: Formal Methods, 14th International Symposium on Formal Methods Proceedings of Lecture Notes in 1480 Computer Science, pp.573-58610, 1007.
DOI : 10.1007/11813040_38

A. P. Sistla, M. Zefran, and Y. Feng, Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State, pp.276-293
DOI : 10.1007/978-3-642-29860-8_21

G. Rosu-monitoring, . Sci, . M. Ann, M. Viswanathan, and . Kim, Foundations for the run-time monitoring of reactive systems -Fundamentals of the MaC language, Proceedings of the First International Colloquium on Theoretical Aspects of Computing Runtime Verification -5th International Conference. Proceedings, pp.327-365, 1007.