Modelbased runtime analysis of distributed reactive systems, ASWEC'06, vol.10, p.pp, 2006. ,
A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Trans. on Industrial Informatics, vol.7, issue.2, pp.179-186, 2011. ,
Sequenceaware Intrusion Detection in Industrial Control Systems, Proc. 1st ACM Workshop CPSS, pp.13-24, 2015. ,
Efficient monitoring of ?-languages, Proc. CAV'05, pp.364-378, 2005. ,
Modelbased software health management for real-time systems, 2011 Aerospace Conference, pp.1-18, 2011. ,
Patterns in property specifications for finite-state verification, Proc. ICSE'99, 1999. ,
Two algorithms for the longest common subsequence of three (or more) strings, Proc. of the 3rd Annual Symposium on Combinatorial Pattern Matching, pp.214-229, 1992. ,
IEC 61131-3: Programming Industrial Automation, 2010. ,
Detecting Process-Aware Attacks in Sequential Control Systems, Proc. NordSec'16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01361081
Breakage-Black Hat. online paper, pp.2017-2027, 2008. ,
General LTL specification mining, Proc. ASE'15, pp.81-92, 2015. ,
A brief account of runtime verification, Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems, IEEE Tran. on Depend. and Sec. Comp, vol.12, issue.1, pp.16-30, 2014. ,
The temporal logic of programs, Proc. SFCS'77, pp.46-57, 1977. ,
On Closure Under Stuttering, FAC, vol.14, pp.342-368, 2003. ,
The report to the president's commission on critical infrastructure protection, 1997. ,
Analysis, Synthesis, and Design of Chemical Processes. Prentice-Hall international series in engineering, 2012. ,