and Arnd Poetzsch-Heffter Monitoring and Testing Actor-and Task-Selection Strategies for Pruning Redundant State-Exploration in Testing, p.49 ,
Zamalloa Efficient and Generalized Decentralized Monitoring of Regular Languages, 66 Ylì es Falcone ,
Holger Hermanns, and Hubert Garavel Effectiveness for Input Output Conformance Simulation iocos ¯, p.100 ,
Luis Llana, and Rafael Martínez-Torres Security Analysis A Program Logic for Verifying Secure Routing Protocols, p.117 ,
Wenchao Zhou, and Boon Thau Loo Verifying Security Policies Using Host Attributes, p.133 ,
Holger Kinkelin, Oliver Hanka, and Georg Carle Denial-of-Service Security Attack in the Continuous-Time World, p.149 ,
and Hanne Riis Nielson Quantitative Information Flow under Generic Leakage Functions and ,
Abstraction and Reduction Dimming Relations for the Efficient Analysis of Concurrent Systems via Action Abstraction, p.216 ,
Giulio Iacobelli, and Mirco Tribastone On the Step Branching Time Closure of Free-Choice Petri Nets, p.232 ,
Formal Verification of Complex Properties on PLC Programs, p.284 ,