共 50 条
- [21] Runtime monitors as sensors of security systems Proc. IASTED INt. Conf. Parall. Distrib. Comput. Syst., (49-58):
- [22] Protocol anomaly detection and verification PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 74 - 81
- [24] A Bayesian model for anomaly detection in SQL databases for security systems PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
- [25] Rule Systems for Runtime Verification: A Short Tutorial RUNTIME VERIFICATION, 2009, 5779 : 1 - +
- [26] Runtime Verification of Component-Based Systems SOFTWARE ENGINEERING AND FORMAL METHODS, 2011, 7041 : 204 - +
- [27] Verification and Runtime Assurance for Dynamical Systems with Uncertainty HSCC2021: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL (PART OF CPS-IOT WEEK), 2021,
- [30] Distributed Runtime Verification of JADE Multiagent Systems INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 81 - 91