I. Beschastnikh, Y. Brun, M. D. Ernst, and A. Krishnamurthy, Inferring models of concurrent systems from logs of their behavior with CSight, Int. Conf. on Software Engineering, pp.468-479, 2014.

I. Beschastnikh, Y. Brun, M. D. Ernst, A. Krishnamurthy, and T. E. Anderson, Mining temporal invariants from partially ordered logs, ACM SIGOPS Operating Systems Review, vol.45, issue.3, pp.39-46, 2012.

A. W. Biermann and J. A. Feldman, On the synthesis of finite-state machines from samples of their behavior, IEEE transactions on Computers, vol.100, issue.6, pp.592-597, 1972.

V. K. Garg, Principles of Distributed Systems, 1996.

V. K. Garg, Lattice completion algorithms for distributed computations, Int. Conf. On Principles Of Distributed Systems, pp.166-180, 2012.

S. Grant, H. Cech, and I. Beschastnikh, Inferring and asserting distributed system invariants, Int. Conf. on Software Engineering, pp.1149-1159, 2018.

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.

D. Lanoe, M. Hurfin, and E. Totel, A scalable and efficient correlation engine to detect multi-step attacks in distributed systems, In: 37th Int. SRDS, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01949183

D. Lo, L. Mariani, and M. Santoro, Learning extended FSA from software: An empirical assessment, Journal of Systems and Software, vol.85, issue.9, pp.2063-2076, 2012.

D. Lorenzoli, L. Mariani, and M. Pezzè, Inferring state-based behavior models, Int. workshop on Dynamic systems analysis, pp.25-32, 2006.

M. Mukund, K. N. Kumar, and M. Sohoni, Synthesizing distributed finite-state systems from MSCs, Int. Conf. on Concurrency Theory, pp.521-535, 2000.

J. L. Pfaltz, Using concept lattices to uncover causal dependencies in software, Formal Concept Analysis, pp.233-247, 2006.

I. Raguenet and C. Maziero, A fuzzy model for the composition of intrusion detectors, 23rd IFIP Intl Information Security Conference (SEC), pp.237-251, 2008.

J. Stender, M. Berlin, and A. Reinefeld, XtreemFS: A file system for the cloud. In: Data intensive storage services for cloud environments, pp.267-285, 2013.

E. Totel, M. Hkimi, M. Hurfin, M. Leslous, and Y. Labiche, Inferring a distributed application behavior model for anomaly based intrusion detection, European Dependable Computing Conference (EDCC), pp.53-64, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01334596

M. Yabandeh, A. Anand, M. Canini, and D. Kostic, Finding almost-invariants in distributed systems, Symp. on Reliable Distributed Systems (SRDS), 2011.