Search

Your search keyword '"runtime enforcement"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "runtime enforcement" Remove constraint Descriptor: "runtime enforcement" Language english Remove constraint Language: english
44 results on '"runtime enforcement"'

Search Results

1. Adaptive Industrial Control Systems via IEC 61499 and Runtime Enforcement.

2. Bounded-memory runtime enforcement with probabilistic and performance analysis.

3. Scalable Security Enforcement for Cyber Physical Systems

4. Online shielding for reinforcement learning.

5. Incremental Security Enforcement for Cyber-Physical Systems

6. Industrial Control Systems Security via Runtime Enforcement.

7. Decentralized deadlock-free enforcement of message orderings in message-based systems.

8. Compositional runtime enforcement revisited.

9. A process calculus approach to detection and mitigation of PLC malware.

10. Comparing controlled system synthesis and suppression enforcement.

11. Decentralized runtime enforcement for robotic swarms.

13. INVITED: Safety Guard: Runtime Enforcement for Safety-Critical Cyber-Physical Systems.

15. Runtime Enforcement of Cyber-Physical Systems.

16. Predictive runtime enforcement.

17. Fully automated runtime enforcement of component-based systems with formal and sound recovery.

18. Runtime enforcement of regular timed properties by suppressing and delaying events.

19. AppGuard – Fine-Grained Policy Enforcement for Untrusted Android Applications.

20. Enforcing ω-regular properties in Markov chains by restarting

21. Enforcement and validation (at runtime) of various notions of opacity.

22. Modeling runtime enforcement with mandatory results automata.

25. Decentralized Runtime Enforcement of Message Sequences in Message-Based Systems

26. Runtime enforcement of timed properties revisited.

27. Runtime Enforcement for Control System Security

29. Modeling and enforcing invariants of dynamic software architectures.

30. Iterative enforcement by suppression: Towards practical enforcement theories.

31. Runtime enforcement monitors: composition, synthesis, and enforcement abilities.

32. Runtime enforcement of cyber-physical systems

33. Controlling Interactions with Libraries in Android Apps Through Runtime Enforcement

34. GUARDIA: specification and enforcement of javascript security policies without VM modifications

35. Enforcement à l’exécution de propriétés temporisées régulières en présence d’évènements incontrôlables

36. Verifying Policy Enforcers

37. Predictive runtime enforcement

38. Runtime Enforcement of Regular Timed Properties by Suppressing and Delaying Events

39. Runtime Enforcement of Security Policies on Black Box Reactive Programs

41. Event Composition Model: Achieving Naturalness in Runtime Enforcement

42. Event Composition Model: Achieving Naturalness in Runtime Enforcement

43. Runtime Enforcement Monitors: composition, synthesis, and enforcement abilities

44. What can you verify and Enforce at Runtime?

Catalog

Books, media, physical & digital resources