Inferring models of concurrent systems from logs of their behavior with CSight, Int. Conf. on Software Engineering, pp.468-479, 2014. ,
Mining temporal invariants from partially ordered logs, ACM SIGOPS Operating Systems Review, vol.45, issue.3, pp.39-46, 2012. ,
On the synthesis of finite-state machines from samples of their behavior, IEEE transactions on Computers, vol.100, issue.6, pp.592-597, 1972. ,
Principles of Distributed Systems, 1996. ,
Lattice completion algorithms for distributed computations, Int. Conf. On Principles Of Distributed Systems, pp.166-180, 2012. ,
Inferring and asserting distributed system invariants, Int. Conf. on Software Engineering, pp.1149-1159, 2018. ,
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
A scalable and efficient correlation engine to detect multi-step attacks in distributed systems, In: 37th Int. SRDS, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01949183
Learning extended FSA from software: An empirical assessment, Journal of Systems and Software, vol.85, issue.9, pp.2063-2076, 2012. ,
Inferring state-based behavior models, Int. workshop on Dynamic systems analysis, pp.25-32, 2006. ,
Synthesizing distributed finite-state systems from MSCs, Int. Conf. on Concurrency Theory, pp.521-535, 2000. ,
Using concept lattices to uncover causal dependencies in software, Formal Concept Analysis, pp.233-247, 2006. ,
A fuzzy model for the composition of intrusion detectors, 23rd IFIP Intl Information Security Conference (SEC), pp.237-251, 2008. ,
XtreemFS: A file system for the cloud. In: Data intensive storage services for cloud environments, pp.267-285, 2013. ,
Inferring a distributed application behavior model for anomaly based intrusion detection, European Dependable Computing Conference (EDCC), pp.53-64, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01334596
Finding almost-invariants in distributed systems, Symp. on Reliable Distributed Systems (SRDS), 2011. ,