Network Protocol System Passive Testing for Fault Management: A??Backward Checking Approach, International Conference on Formal Techniques for Networked and Distributed Systems, pp.150-166, 2004. ,
DOI : 10.1016/S0950-5849(99)00039-7
Minimization of timed transition systems, CONCUR '92: Third International Conference on Concurrency Theory Stony Brook Proceedings, pp.340-354, 1992. ,
DOI : 10.1007/BFb0084802
The theory of timed automata, Lecture Notes in Computer Science, vol.600, pp.45-73, 1992. ,
DOI : 10.1007/BFb0031987
First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014, International Journal on Software Tools for Technology Transfer, vol.53, issue.4, pp.1-40, 2017. ,
DOI : 10.1016/j.comnet.2008.09.022
Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013. ,
DOI : 10.1145/2487222.2487225
Timed Automata: Semantics, Algorithms and Tools, Lectures on Concurrency and Petri Nets: Advances in Petri Nets, pp.87-124, 2004. ,
DOI : 10.1007/978-3-540-27755-2_3
New approaches for passive testing using an Extended Finite State Machine specification, Information and Software Technology, vol.45, issue.12, pp.837-852, 2003. ,
DOI : 10.1016/S0950-5849(03)00063-6
You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-04766-4_20
URL : https://hal.archives-ouvertes.fr/hal-00523653
A tutorial on runtime verification, Engineering Dependable Software Systems, pp.141-175, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853727
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1145/1273442.1250746
URL : https://hal.archives-ouvertes.fr/hal-00576948
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
DOI : 10.1016/j.jlap.2008.08.004
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
TiPEX: A Tool Chain for Timed Property Enforcement During eXecution, 6th International Conference on Runtime Verification, p.12, 2015. ,
DOI : 10.1016/j.entcs.2005.10.035
URL : https://hal.archives-ouvertes.fr/hal-01244446
Runtime Enforcement of Timed Properties, Runtime Verification, Third International Conference, pp.229-244, 2012. ,
DOI : 10.1007/978-3-642-35632-2_23
URL : https://hal.archives-ouvertes.fr/hal-00743270
Optimal enforcement of (timed) properties with uncontrollable events, Mathematical Structures in Computer Science, vol.16, pp.1-46, 2017. ,
DOI : 10.1145/353323.353382
URL : https://hal.archives-ouvertes.fr/hal-01262444
Enforcement of (Timed) Properties with Uncontrollable Events, Theoretical Aspects of Computing -ICTAC 2015, pp.542-560, 2015. ,
DOI : 10.1007/978-3-319-25150-9_31
URL : https://hal.archives-ouvertes.fr/hal-01185238
Runtime enforcement using Büchi games, Proceedings of Model Checking Software -24th International Symposium, SPIN 2017, pp.70-79, 2017. ,
DOI : 10.1145/3092282.3092296
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382