Runtime enforcement with reordering, healing, and suppression
From MaRDI portal
Publication:6041274
DOI10.1007/978-3-030-92124-8_3zbMath1522.68312MaRDI QIDQ6041274
Publication date: 26 May 2023
Published in: Software Engineering and Formal Methods (Search for Journal in Brave)
Cites Work
- Decentralised LTL monitoring
- Which security policies are enforceable by runtime monitors? A survey
- Runtime enforcement monitors: Composition, synthesis, and enforcement abilities
- Organising LTL monitors over distributed systems with a global clock
- A survey of challenges for runtime verification from advanced application domains (beyond software)
- A brief account of runtime verification
- Counterexample Guided Synthesis of Monitors for Realizability Enforcement
- Runtime Verification over Out-of-order Streams
This page was built for publication: Runtime enforcement with reordering, healing, and suppression