B. Alcalde, A. Cavalli, D. Chen, D. Khuu, and D. Lee, Network Protocol System Passive Testing for Fault Management: A??Backward Checking Approach, International Conference on Formal Techniques for Networked and Distributed Systems, pp.150-166, 2004.
DOI : 10.1016/S0950-5849(99)00039-7

R. Alur, C. Courcoubetis, N. Halbwachs, D. Dill, and H. Wong-toi, Minimization of timed transition systems, CONCUR '92: Third International Conference on Concurrency Theory Stony Brook Proceedings, pp.340-354, 1992.
DOI : 10.1007/BFb0084802

R. Alur and D. Dill, The theory of timed automata, Lecture Notes in Computer Science, vol.600, pp.45-73, 1992.
DOI : 10.1007/BFb0031987

E. Bartocci, Y. Falcone, B. Bonakdarpour, C. Colombo, N. Decker et al., First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014, International Journal on Software Tools for Technology Transfer, vol.53, issue.4, pp.1-40, 2017.
DOI : 10.1016/j.comnet.2008.09.022

D. Basin, V. Jugé, F. Klaedtke, and E. , Enforceable Security Policies Revisited, ACM Transactions on Information and System Security, vol.16, issue.1, pp.1-3, 2013.
DOI : 10.1145/2487222.2487225

J. Bengtsson and W. Yi, Timed Automata: Semantics, Algorithms and Tools, Lectures on Concurrency and Petri Nets: Advances in Petri Nets, pp.87-124, 2004.
DOI : 10.1007/978-3-540-27755-2_3

A. Cavalli, C. Gervy, and S. Prokopenko, New approaches for passive testing using an Extended Finite State Machine specification, Information and Software Technology, vol.45, issue.12, pp.837-852, 2003.
DOI : 10.1016/S0950-5849(03)00063-6

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010.
DOI : 10.1007/978-3-642-04766-4_20

URL : https://hal.archives-ouvertes.fr/hal-00523653

Y. Falcone, K. Havelund, and G. Reger, A tutorial on runtime verification, Engineering Dependable Software Systems, pp.141-175, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853727

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1145/1273442.1250746

URL : https://hal.archives-ouvertes.fr/hal-00576948

M. Leucker and C. Schallhart, A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009.
DOI : 10.1016/j.jlap.2008.08.004

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

S. Pinisetty, Y. Falcone, T. Jéron, and H. Marchand, TiPEX: A Tool Chain for Timed Property Enforcement During eXecution, 6th International Conference on Runtime Verification, p.12, 2015.
DOI : 10.1016/j.entcs.2005.10.035

URL : https://hal.archives-ouvertes.fr/hal-01244446

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime Enforcement of Timed Properties, Runtime Verification, Third International Conference, pp.229-244, 2012.
DOI : 10.1007/978-3-642-35632-2_23

URL : https://hal.archives-ouvertes.fr/hal-00743270

M. Renard, Y. Falcone, A. Rollet, T. Jéron, and H. Marchand, Optimal enforcement of (timed) properties with uncontrollable events, Mathematical Structures in Computer Science, vol.16, pp.1-46, 2017.
DOI : 10.1145/353323.353382

URL : https://hal.archives-ouvertes.fr/hal-01262444

M. Renard, Y. Falcone, A. Rollet, S. Pinisetty, T. Jéron et al., Enforcement of (Timed) Properties with Uncontrollable Events, Theoretical Aspects of Computing -ICTAC 2015, pp.542-560, 2015.
DOI : 10.1007/978-3-319-25150-9_31

URL : https://hal.archives-ouvertes.fr/hal-01185238

M. Renard, A. Rollet, and Y. Falcone, Runtime enforcement using Büchi games, Proceedings of Model Checking Software -24th International Symposium, SPIN 2017, pp.70-79, 2017.
DOI : 10.1145/3092282.3092296

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382