P. Zeller, A. Bieniusa, and .. , and Arnd Poetzsch-Heffter Monitoring and Testing Actor-and Task-Selection Strategies for Pruning Redundant State-Exploration in Testing, p.49

E. Albert, P. Arenas, M. Gómez, and .. , Zamalloa Efficient and Generalized Decentralized Monitoring of Regular Languages, 66 Ylì es Falcone

A. Graf-brill and .. , Holger Hermanns, and Hubert Garavel Effectiveness for Input Output Conformance Simulation iocos ¯, p.100

C. Gregorio and -. , Luis Llana, and Rafael Martínez-Torres Security Analysis A Program Logic for Verifying Secure Routing Protocols, p.117

C. Chen, L. Jia, H. Xu, C. Luo, and .. , Wenchao Zhou, and Boon Thau Loo Verifying Security Policies Using Host Attributes, p.133

C. Diekmann, -. A. Stephan, H. Posselt, and . Niedermayer, Holger Kinkelin, Oliver Hanka, and Georg Carle Denial-of-Service Security Attack in the Continuous-Time World, p.149

S. Wang and F. Nielson, and Hanne Riis Nielson Quantitative Information Flow under Generic Leakage Functions and

L. Xu, K. Chatzikokolakis, H. Lin-bisimulation, and .. , Abstraction and Reduction Dimming Relations for the Efficient Analysis of Concurrent Systems via Action Abstraction, p.216

R. De and N. , Giulio Iacobelli, and Mirco Tribastone On the Step Branching Time Closure of Free-Choice Petri Nets, p.232

S. Baarir, A. Duret-lutz, and .. , Formal Verification of Complex Properties on PLC Programs, p.284