Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
From MaRDI portal
(Redirected from Publication:548696)
Recommendations
Cites work
Cited in
(22)- Execution monitoring enforcement under memory-limitation constraints
- Bounded-memory runtime enforcement with probabilistic and performance analysis
- Decentralized LTL enforcement
- On bidirectional runtime enforcement
- Runtime enforcement of timed properties revisited
- On runtime enforcement via suppressions
- A process calculus approach to detection and mitigation of PLC malware
- Runtime enforcement with reordering, healing, and suppression
- Compositional runtime enforcement revisited
- Provably correct runtime monitoring
- Bidirectional Runtime Enforcement of First-Order Branching-Time Properties
- Runtime enforcement of hyperproperties
- Which security policies are enforceable by runtime monitors? A survey
- Enforcement and validation (at runtime) of various notions of opacity
- On first-order runtime enforcement of branching-time properties
- Predictive runtime enforcement
- Safety enforcement via programmable strategies in Maude
- Real-time policy enforcement with metric first-order temporal logic
- Runtime enforcement of timed properties using games
- Enforcing non-safety security policies with program monitors
- Optimal enforcement of (timed) properties with uncontrollable events
- scientific article; zbMATH DE number 1962746 (Why is no real title available?)
This page was built for publication: Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q548696)