Combining test case generation and runtime verification, Theoretical Computer Science, vol.336, issue.2-3, pp.209-234, 2005. ,
Network protocol system passive testing for fault management: A backward checking approach, Lecture Notes in Computer Science, vol.3235, pp.150-166, 2004. ,
Passive testing of web services, 2011. ,
, Lecture Notes in Computer Science, vol.6551, pp.56-70
A passive testing approach based on invariants: application to the wap, Computer Networks, vol.48, pp.247-266, 2005. ,
Rule based runtime verification, 2004. ,
, Lecture Notes in Computer Science, vol.2937, pp.44-57
From runtime verification to evolvable systems, the 7th international conference on Runtime verification, RV'07, pp.97-110, 2007. ,
A Passive Testing Approach for Security Checking and its Practical Usage for Web Services Monitoring, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01360187
Integrating formal verification and conformance testing for reactive systems, IEEE Trans. Softw. Eng, vol.33, issue.8, pp.558-574, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00422904
A logic-based passive testing approach for the validation of communicating protocols, ENASE 2012-Proceedings of the 7th International Conference on Evaluation of Novel Approaches to Software Engineering, pp.53-64, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00738523
Mops: an infrastructure for examining security properties of software, the 9th ACM Conference on Computer and Communications Security, pp.235-244, 2002. ,
Event-based runtime verification of java programs, the 3rd international workshop on Dynamic analysis, 2005. ,
Lola: Runtime monitoring of synchronous systems, the 12th International Symposium on Temporal Representation and Reasoning, pp.166-174, 2005. ,
Runtime Verification of Component-Based Systems, 9th International Conference on Software Engineering and Formal Methods, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00642969
Synthesizing monitors for safety properties, the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2002. ,
Symbolic determinisation of extended automata, 2006. ,
, Fourth IFIP International Conference on Theoretical Computer Science, vol.209, pp.197-212
Web Services Business Process Execution Language Version 2.0, OASIS Standard, pp.179-183, 2007. ,
Data-centric property formulation for passive testing of communication protocols, Proceedings of the 13th IASME/WSEAS, ACC'11/MMACTEE'11, pp.176-181, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01303064
Network protocol system monitoring: a formal approach with passive testing, IEEE/ACM Trans. Netw, vol.14, pp.424-437, 2006. ,
A brief account of runtime verification, Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
On fault location in networks by passive testing, IEEE International Conference on Performance, Computing, and Communications, pp.281-287, 2000. ,
Programming services with correlation sets, ICSOC, vol.7084, pp.125-141, 2011. ,
Synchronizing asynchronous conformance testing, Proceedings of the 9th international conference on Software engineering and formal methods, SEFM'11, pp.334-349, 2009. ,
Hardware runtime monitoring for dependable cots-based real-time embedded systems, Real-Time Systems Symposium, pp.481-491, 2008. ,
Testing Transition Systems with Input and Output Testers, TESTERS, PROC TESTCOM, pp.129-145, 2003. ,
, , 2013.
Enforceable security policies, ACM Trans. Inf. Syst. Secur, vol.3, issue.1, pp.30-50, 2000. ,
Test generation with inputs, outputs and repetitive quiescence. SoftwareConcepts and Tools, vol.17, pp.103-120, 1996. ,