Learning to protect communications with adversarial neural cryptography, 2016. ,
Probabilistic temporal logic falsification of cyber-physical systems, ACM Trans Embed Comput Syst, vol.12, issue.s2, 2013. ,
Functional gradient descent method for metric temporal logic specifications, Proceedings of the American control conference (ACC'14, pp.2312-2317, 2014. ,
Monitoring for silent actions, Proceedings of the 37th IARCS annual conference on foundations of software technology and theoretical computer science, vol.93, p.14, 2017. ,
A framework for parameterized monitorability, Proceedings of the 21st Int'l conference on foundations of software science and computation structures (FOSSACS'18), vol.10803, pp.203-220, 2018. ,
On the complexity of determinizing monitors, Proceedings of the 22nd Int'l conference on implementation and application of automata (CIAA'17), vol.10329, pp.1-13, 2017. ,
Adventures in monitorability: from branching to linear time and back again, PACMPL, vol.3, p.29, 2019. ,
On runtime enforcement via suppressions, 29th International conference on concurrency theory, CONCUR 2018, vol.118, p.17, 2018. ,
BlinkDB: Queries with bounded errors and bounded response times on very large data, Proceedings of the 8th ACM European conference on computer systems (EuroSys '13, pp.29-42, 2013. ,
Smart contracts: a killer application for deductive source code verification, Principled software development-essays dedicated to Arnd Poetzsch-Heffter on the occasion of his 60th birthday, pp.1-18, 2018. ,
Time robustness in MTL and expressivity in hybrid system falsification, Proceedings of the 27th Int'l conference on computer aided verification (CAV'15), vol.9207, pp.356-374, 2015. ,
Techniques to tackle state explosion in global predicate detection, IEEE Trans Softw Eng (TSE), vol.27, issue.8, pp.704-714, 2001. ,
Verifiable agent interaction in abductive logic programming: the SCIFF framework, ACM Trans Comput Log, vol.9, issue.4, p.43, 2008. ,
Reachability analysis of nonlinear systems using conservative polynomialization and non-convex sets, Proceedings the 16th Int'l conference on hybrid systems computation and control (HSCC'13, pp.173-182, 2013. ,
The benefits of relaxing punctuality, J ACM, vol.43, issue.1, pp.116-146, 1996. ,
A rule-based language for complex event processing and reasoning, Proceedings of the 4th Int'l conference on web reasoning and rule systems (RR'10), vol.6333, pp.42-57, 2010. ,
S-taliro: A tool for temporal logic falsification for hybrid systems, Proceedings of the 17th Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'11), vol.6605, pp.254-257, 2011. ,
Fainekos (GE) (2010) Ant colonies for temporal logic falsification of hybrid systems, Proceedings of the 36th annual conference on IEEE industrial electronics society (IECON'10) ,
Data minimisation: a language-based approach, Proceedings of the 32nd IFIP TC Int'l conference on ICT system security and privacy protection (IFIP SEC'17), vol.502, pp.442-456, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01648986
Functional monitoring without monotonicity, Proceedings of the 36th Int'l colloquium on automata, languages and programming: Part I (ICALP'09), vol.5555, pp.95-106, 2009. ,
The CQL continuous query language: semantic foundations and query execution, VLDB J, vol.15, issue.2, pp.121-142, 2006. ,
ARM CoreSight Architecture Specification, 2013. ,
A view of cloud computing, Commun ACM, vol.53, issue.4, pp.50-58, 2010. ,
Identifying extension-based ad injection via fine-grained web content provenance, Proceedings of the 19th Int'l symposium on research in attacks, intrusions, and defenses (RAID'16), vol.9854, pp.415-436, 2016. ,
Timed regular expressions, J ACM, vol.49, issue.2, pp.172-206, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-01699969
Reachability analysis of dynamical systems having piecewiseconstant derivatives, Theor Comput Sci, vol.138, issue.1, pp.35-65, 1995. ,
Low dimensional hybrid systems-decidable, undecidable, don't know, Inf Comput, vol.211, pp.138-159, 2012. ,
On the decidability of the reachability problem for planar differential inclusions, 4th International workshop on hybrid systems: computation and control (HSCC'01), pp.89-104, 2001. ,
Algorithmic analysis of polygonal hybrid systems, Part I: reachability. Theor Comput Sci, vol.379, issue.1-2, pp.231-265, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00157340
A monitoring tool for a branching-time logic, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.473-481, 2016. ,
Trace partitioning and local monitoring for asynchronous components, Proceedings of the 15th Int'l conference on software engineering and formal methods (SEFM'17), vol.10469, pp.219-235, 2017. ,
Distributed computing: fundamentals, simulations and advanced topics, 2004. ,
A survey of attacks on Ethereum smart contracts (SoK), Proceedings of the 6th Int'l conference on principles of security and trust (POST'17), vol.10204, pp.164-186, 2017. ,
Permissive dynamic information flow analysis, Proceedings of the workshop on programming languages and analysis for security, pp.1-12, 2010. ,
Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symp, on principles of programming languages (POPL'12), pp.165-178, 2012. ,
Monitoring smart contracts: ContractLarva and open challenges beyond, Proceedings of the 18th Int'l conference on runtime verification (RV'18), 2018. ,
Contract automata: an operational view of contracts between interactive parties, Artif Intell Law, vol.24, issue.3, pp.203-243, 2016. ,
Models and issues in data stream systems, Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS'02, pp.1-16, 2002. ,
Distributed top-k monitoring, Proceedings of the 2003 ACM SIGMOD Int'l conference on management of data (SIGMOD'03), pp.28-39, 2003. ,
The incremental garbage collection of processes, SIGPLAN Not, vol.12, issue.8, pp.55-59, 1977. ,
Hybrid information flow analysis for real-world C code, Proceedings of the 11th Int'l conference on tests and proofs (TAP'17), pp.23-40, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01658653
MapReduce for parallel trace validation of LTL properties, Proceedings of the 17th Int'l conference on runtime verification (RV'12), vol.7687, pp.184-198, 2012. ,
A formal methods approach to pattern recognition and synthesis in reaction diffusion networks, IEEE Trans Control Netw Syst, vol.5, issue.1, pp.308-320, 2018. ,
Monitoring mobile and spatially distributed cyberphysical systems, Proceedings of the 15th ACM-IEEE international conference on formal methods and models for system design (MEMOCODE'17, pp.146-155, 2017. ,
System design of stochastic models using robustness of temporal properties, Theor Comput Sci, vol.587, pp.3-25, 2015. ,
Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications, Lectures on runtime verification-introductory and advanced topics, vol.10457, pp.135-175, 2018. ,
, Lectures on runtime verification-introductory and advanced topics, volume 10457 of lecture notes in computer science, 2018.
Localizing faults in Simulink/Stateflow models with STL, Proceedings of the 21st ACM Int'l conference on hybrid systems computation and control (HSCC'18, pp.197-206, 2018. ,
Monitoring with uncertainty, Proceedings 3rd Int'l workshop on hybrid autonomous systems, vol.124, pp.1-4, 2013. ,
Adaptive runtime verification, RV 2012, pp.168-182, 2012. ,
Computational modeling, formal analysis, and tools for systems biology, PLoS Comput Biol, vol.12, issue.1, p.1004591, 2016. ,
Optimal proofs for linear temporal logic on lasso words, Proceedings of the 16th Int'l symposium on automated technology for verification and analysis (ATVA'18), vol.11138, 2018. ,
Scalable offline monitoring of temporal specifications, Formal Methods Syst Des, vol.49, issue.1-2, pp.75-108, 2016. ,
Monitoring compliance policies over incomplete and disagreeing logs, Proceedings of the 4th Int'l conference on runtime verification (RV'13), vol.8174, pp.151-167, 2013. ,
The MonPoly monitoring tool, An international workshop on competitions, usability, benchmarks, evaluation, and standardisation for runtime verification tools, vol.3, pp.19-28, 2017. ,
Almost event-rate indepedent monitoring of metric dynamic logic, Proceedings of the 17th Int'l conference on runtime verification (RV'17), vol.10548, pp.85-102, 2017. ,
Almost event-rate independent monitoring of metric temporal logic, Proceedings of the 23rd Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'17): Part II, vol.10206, pp.94-112, 2017. ,
Scalable offline monitoring, Proceedings of 14th Int'l. conference on runtime verification (RV'14), vol.8734, pp.31-47, 2014. ,
MONPOLY: Monitoring usage-control policies, Proceedings of the second Int'l conference on runtime verification (RV'11), vol.7186, pp.360-364, 2011. ,
Monitoring compliance policies over incomplete and disagreeing logs, Proceedings of the third Int'l conference on runtime verification (RV'12), vol.7687, pp.151-167, 2012. ,
Monitoring of temporal first-order properties with aggregations, Formal Methods Syst Des, vol.46, issue.3, pp.262-285, 2015. ,
Monitoring metric first-order temporal properties, J ACM, vol.62, issue.2, p.15, 2015. ,
Failure-aware runtime verification of distributed systems, Proceedings of the 35th IARCS annual conference on foundations of software technology and theoretical computer science (FSTTCS'15), vol.45, pp.590-603, 2015. ,
Runtime verification of temporal properties over out-of-order data streams, Proceedings of the 29th Int'l conference on computer aided verification (CAV'17), vol.10426, pp.356-376, 2017. ,
Decentralised LTL monitoring, Proceedings of the 18th Int'l symposium on formal methods (FM'12), vol.7436, pp.85-100, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00857286
Decentralised LTL monitoring, Formal Methods Syst Des, vol.48, issue.1-2, pp.49-93, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-00857286
Runtime verification for LTL and TLTL, ACM Trans Softw Eng Methodol, vol.20, p.64, 2011. ,
Run-time monitoring and formal analysis of information flows in chromium, The Internet Society 69. BBC Technology. Ransomware cyber-attack threat escalating-Europol, 2015. ,
Formal methods for discrete-time dynamical systems, 2017. ,
Control of systems integrating logic, dynamics, and constraints, Automatica, vol.35, issue.3, pp.407-427, 1999. ,
Efficient large-scale trace checking using MapReduce, Proceedings of the 38th Int'l conference on software engineering (ICSE'16, pp.888-898, 2016. ,
On the efficiency of durable state machine replication, Proceedings of the 2013 USENIX conference on annual technical conference (ATC'13). USENIX Association, pp.169-180, 2013. ,
Hybrid monitoring of attacker knowledge, Proceedings of the IEEE 29th computer security foundations symposium (CSF'16, pp.225-238, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01310572
Monitoring distributed systems, 2016. ,
Formal verification of smart contracts, Proceedings of the 2016 ACM workshop on programming languages and analysis for security (PLAS'16), pp.91-96, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01400469
Trace checking of metric temporal logic with aggregating modalities using MapReduce, Proceedings of the 12th Int'l conference on software engineering and formal methods (SEFM'14), vol.8702, pp.144-158, 2014. ,
) A taxonomy of information flow monitors, Proceedings of the 7th Int'l conference on principles of security and trust (POST'16), vol.9635, pp.46-67, 2016. ,
Challenges in fault-tolerant distributed runtime verification, Proceedings of the 7th Int'l symposium on leveraging applications of formal methods, verification and validation: foundational techniques (ISoLA'16): Part II, vol.9952, pp.363-370, 2016. ,
Monitoring hyperproperties by combining static analysis and runtime verification, 8th International symposium on leveraging applications of formal methods, verification and validation-track: a broader view on verification: from static to runtime and back, vol.11245, pp.8-27, 2018. ,
Paxos replicated state machines as the basis of a high-performance data store, Proceedings of the 8th USENIX conference on networked systems design and implementation (NSDI'11). USENIX Association, pp.141-154, 2011. ,
U-Check: Model checking and parameter synthesis under uncertainty, Proceedings of the 12th Int'l. conference on quantitative evaluation of systems (QEST'15), vol.9259, pp.89-104, 2015. ,
Automated reasoning: essays in Honor of Woody Bledsoe, chapter MJRTYa fast majority vote algorithm, pp.105-117, 1991. ,
Hlio: Mixing static and dynamic typing for information-flow control in haskell, Proceedings of the 20th ACM SIGPLAN Int'l conference on functional programming (ICFP'15, pp.289-301, 2015. ,
On the complexity of temporal-logic path checking, Proceedings of 41st Int'l colloquium on automata, languages, and programming (ICALP'14). Part II, vol.8573, pp.86-97, 2014. ,
Controlling ambiguities in legislative language, Proceedings of the Int'l workshop on controlled natural language (CNL'10), vol.7175, pp.21-42, 2010. ,
The chubby lock service for loosely-coupled distributed systems, Proceedings of the 7th symposium on operating systems design and implementation (OSDI'06). USENIX Association, pp.335-350, 2006. ,
A next generation smart contract and decentralized application platform. Ethereum White Paper, 2017. ,
A web-based tool for analysing normative documents in English, Proceedings of the the 33rd ACM/SIGAPP symposium on applied computing-software verification and testing track (SAC-SVT'18), 2018. ,
Controlled natural language in a game for legal assistance, Proceedings of the 2nd Int'l workshop on controlled natural language (CNL'10), vol.7175, pp.137-153, 2010. ,
A CNL for contract-oriented diagrams, Proceedings of the 4th Int'l workshop on controlled natural language (CNL'14), vol.8625, pp.135-146, 2014. ,
Apache flink TM : stream and batch processing in a single engine, IEEE Data Eng Bull, vol.38, issue.4, pp.28-38, 2015. ,
Runtime adaptation for actor systems, Proceedings of the 6th Int'l conference on runtime verification (RV'15), vol.9333, pp.38-54, 2015. ,
On implementing a monitor-oriented programming framework for actor systems, Proceedings of the 12th Int'l conference on integrated formal methods iFM'16, vol.9681, pp.176-192, 2016. ,
Improving runtime overheads for detecter, Proceedings of the 12th Int'l workshop on formal engineering approaches to software components and architectures (FESCA'15), vol.178, pp.1-8, 2015. ,
Practical byzantine fault tolerance and proactive recovery, ACM Trans Comput Syst, vol.20, issue.4, pp.398-461, 2002. ,
Privacy by design: the 7 foundational principles, Information and privacy commissioner of, 2009. ,
Combining time and frequency domain specifications for periodic signals, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.294-309, 2011. ,
Characterization of temporal property classes, Proceedings of the 19th Int'l colloquium on automata, languages and programming (ICALP'92), vol.623, pp.474-486, 1992. ,
A distributed abstraction algorithm for online predicate detection, Proceedings of the 32nd IEEE symposium on reliable distributed systems, (SRDS'13, pp.101-110, 2013. ,
Parametric trace slicing and monitoring, Proceedings of the 15th Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'09), vol.5505, pp.246-261, 2009. ,
Flow*: an analyzer for non-linear hybrid systems, Proceedings of the 25th Int'l conference on computer aided verification (CAV'13), vol.8044, pp.258-263, 2013. ,
, Hyperproperties. J Comput Secur, vol.18, issue.6, pp.1157-1210, 2010.
Contracts over smart contracts: recovering from violations dynamically, Proceedings of the 8th Int'l symposium on leveraging applications of formal methods, verification and validation (ISoLA'18), 2018. ,
Organising LTL monitors over distributed systems with a global clock, Formal Methods Syst Des, vol.49, issue.1-2, pp.109-158, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01120551
polyLarva: Runtime verification with configurable resource-aware monitoring boundaries, Proceedings of the 10th Int'l conference on software engineering and formal methods (SEFM'12), vol.7504, pp.218-232, 2012. ,
Monitor-oriented compensation programming through compensating automata, ECEASST, vol.58, pp.1-12, 2013. ,
Recovery within long running transactions, ACM Comput Surv, vol.45, issue.3, p.28, 2013. ,
Safer asynchronous runtime monitoring using compensations, Formal Methods Syst Des, vol.41, issue.3, pp.269-294, 2012. ,
Consistent detection of global predicates, Proceedings of the ACM/ONR Workshop on parallel and distributed debugging (PADD '91), pp.163-173, 1991. ,
Continuous distributed monitoring: a short survey, Proceedings of the First Int'l workshop on algorithms and models for distributed event processing (AlMoDEP'11), vol.585, pp.1-10, 2011. ,
Sketching streams through the net: distributed approximate query tracking, Proceedings of the 31st Int'l conference on very large data bases (VLDB'05). VLDB Endowment, pp.13-24, 2005. ,
Synopses for massive data: samples, histograms, wavelets, sketches. Found Trends Databases, vol.4, pp.1-294, 2012. ,
Holistic aggregates in a networked world: Distributed tracking of approximate quantiles, Proceedings of the 2005 ACM SIGMOD Int'l conference on management of data (SIGMOD'05), pp.25-36, 2005. ,
Algorithms for distributed functional monitoring, ACM Trans Algorithms, vol.7, issue.2, p.20, 2011. ,
Continuous sampling from distributed streams, J ACM, vol.59, issue.2, p.25, 2012. ,
Council of European Union. Regulation (EU) 2016/679 of the European Parliament, vol.118, pp.32016-0679, 2011. ,
Verification of analog and mixed-signal circuits using hybrid system techniques, Proceedings of the 5th Int'l conference on formal methods in computer-aided design (FMCAD'04), vol.3312, pp.21-36, 2004. ,
Computing reachable states for nonlinear biological models, Proceedings of the 7th Int'l conference on computational methods in systems biology (CMSB'09), vol.5688, pp.126-141, 2009. ,
LOLA: Runtime monitoring of synchronous systems, Proceedings of the 12th Int'l symposium of temporal representation and reasoning (TIME'05), pp.166-174, 2005. ,
Frequency estimation of Internet packet streams with limited space, Proceedings of the 10th annual European symposium on algorithms (ESA'02), vol.2461, pp.348-360, 2002. ,
A lattice model of secure information flow, Commun ACM, vol.19, issue.5, pp.236-243, 1976. ,
Certification of programs for secure information flow, Commun ACM, vol.20, issue.7, pp.504-513, 1977. ,
Robust online monitoring of signal temporal logic, Formal Methods System Des, vol.51, issue.1, pp.5-30, 2017. ,
Noninterference through secure multi-execution, Proceedings of the 31st IEEE symposium on security and privacy (SP'10, pp.109-124, 2010. ,
Precise detection of atomicity violations, Hardware and software: verification and testing, vol.7857, pp.8-23, 2013. ,
Verification of snapshot isolation in transactional memory Java programs, Proceedings of the 26th European conference on object-oriented programming, vol.7313, pp.640-664, 2012. ,
On-line monitoring for temporal logic robustness, Proceedings of the 5th Int'l conference on runtime verification (RV'14), pp.231-246, 2014. ,
Breach, a toolbox for verification and parameter synthesis of hybrid systems, Proceedings of the 22nd Int'l conference on computer aided verification (CAV'10), vol.6174, pp.167-170, 2010. ,
Efficient robust monitoring for STL, Proceedings of the 25th Int'l conference on computer aided verification (CAV'13), vol.8044, pp.264-279, 2013. ,
Parameter synthesis for hybrid systems with an application to Simulink models, Proceedings of the 12th Int'l conference on hybrid systems: computation and control (HSCC'09), vol.5469, pp.165-179, 2009. ,
Robust satisfaction of temporal logic over real-valued signals, Proceedings of the 8th Int'l conference on formal modeling and analysis of timed systems (FORMATS'10), vol.6246, pp.92-106, 2010. ,
On temporal logic and signal processing, Proceedings of the 10th Int'l symposium on automated technology for verification and analysis (ATVA'12), vol.7561, pp.92-106, 2012. ,
A practical introduction to PSL. Series on integrated circuits and systems, 2006. ,
Monitoring decentralized specifications, Proceedings of the 26th ACM SIGSOFT Int'l symposium on software testing and analysis, pp.125-135, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01653725
On the monitoring of decentralized specifications semantics, properties, analysis, and simulation, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02283429
Runtime verification of Ethereum smart contracts, Proceedings of the 1st Int'l workshop on blockchain dependability, 2018. ,
Database replication using generalized snapshot isolation, Proceedings of the 24th IEEE symposium on reliable distributed systems (SRDS'05), pp.73-84, 2005. ,
, Reasoning about knowledge, vol.4, 2003.
Inverse design of airfoils based on a novel formulation of the ant colony optimization method, Inverse Probl Eng, vol.11, issue.1, pp.21-38, 2003. ,
Temporal logic verification using simulation, Proceedings of the 4th Int'l conference on formal modelling and analysis of timed systems (FORMATS'06), vol.4202, pp.171-186, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00171560
Robustness of temporal logic specifications for continuous-time signals, Theor Comput Sci, vol.410, issue.42, pp.4279-4291, 2009. ,
Efficient and generalized decentralized monitoring of regular languages, Proceedings of 34th IFIP Int'l conference on formal techniques for distributed objects, components, and systems (FORTE'14), vol.8461, pp.66-83, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00972559
Runtime verification of safety-progress properties, Runtime verification, 9th international workshop, vol.5779, pp.40-59, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00420487
What can you verify and enforce at runtime?, Int J Softw Tools Technol Transf (STTT), vol.14, issue.3, pp.349-382, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00497350
Runtime verification of componentbased systems in the BIP framework with formally-proved sound and complete instrumentation, Softw Syst Model, vol.14, issue.1, pp.173-199, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-00972566
Parametric linear dynamic logic, Proceedings of the 5th Int'l symposium on games, automata, logics and formal verification (GandALF'14), vol.161, pp.60-73, 2014. ,
Path checking for MTL and TPTL over data words, Potapov I (ed) Proceedings of the 19th Int'l conference on developments in language theory (DLT'15), vol.9168, pp.326-339, 2015. ,
Trace diagnostics using temporal implicants, Proceedings of the 13th International symposium on automated technology for verification and analysis (ATVA'15), vol.9364, pp.241-258, 2015. ,
Measuring with timed patterns, Proceedings of the 27th Int'l conference on computer aided verification (CAV'15), vol.9207, pp.322-337, 2015. ,
Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm, Proceedings of the, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00406166
On the number of opinions needed for fault-tolerant run-time monitoring in distributed systems, Proceedings of the 5th Int'l conference on runtime verification (RV'14), vol.8734, pp.92-107, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01102121
A theory of monitors-(extended abstract), Proceedings of the 19th Int'l conference on foundations of software science and computation structures (FOSSACS'16), vol.9634, pp.145-161, 2016. ,
Consistently-detecting monitors, Proceedings of the 28th Int'l conference on concurrency theory, vol.85, pp.1-8, 2017. ,
Monitorability for the Hennessy-Milner logic with recursion, Formal Methods Syst Des, vol.51, issue.1, pp.87-116, 2017. ,
Distributed system contract monitoring, J Log Algebraic Program, vol.82, issue.5-7, pp.186-215, 2013. ,
A theory for observational fault tolerance, J Log Algebraic Programm, vol.73, issue.1-2, pp.22-50, 2007. ,
A theory of system behaviour in the presence of node and link failure, Inf Comput, vol.206, issue.6, pp.711-759, 2008. ,
Reversible choreographies via monitoring in erlang, Proceedings of the 18th IFIP WG 6.1 Int'l conference on distributed applications and interoperable systems (DAIS'18), vol.10853, pp.75-92, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01824635
Runtime verification for decentralised and distributed systems, Lectures on runtime verification-introductory and advanced topics, pp.176-210, 2018. ,
Synthesising correct concurrent runtime monitors, Formal Methods Syst Des, vol.46, issue.3, pp.226-261, 2015. ,
Efficient solving of large non-linear arithmetic constraint systems with complex Boolean structure, J Satisf Boolean Model Comput, vol.1, issue.3-4, pp.209-236, 2007. ,
PHAVer: algorithmic verification of hybrid systems past HyTech, Int J Softw Tools Technol Transfer, vol.10, issue.3, pp.263-279, 2008. ,
SpaceEx: Scalable verification of hybrid systems, Proceedings of the 23rd Int'l conference on computer aided verification (CAV'11), vol.6806, pp.379-395, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00769608
Specifications are (preferably) executable, Softw Eng J, vol.7, issue.5, pp.323-334, 1992. ,
A probe effect in concurrent programs, Softw Pract Exp, vol.16, issue.3, pp.225-233, 1986. ,
Normative requirements as linked data, Proceedings of the 30th annual conference on legal knowledge and information systems (JURIX'17), vol.302, pp.1-10, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01643769
Efficient middleware for byzantine fault tolerant database replication, Proceedings of the 6th conference on computer systems (EuroSys'11), pp.107-122, 2011. ,
Optimized execution of business processes on Blockchain, Proceedings of the 15th Int'l conference on business process management (BPM'17), vol.10445, pp.130-146, 2017. ,
Policy auditing over incomplete logs: theory, implementation and applications, Proceedings of the 18th ACM conference on computer and communications security, pp.151-162, 2011. ,
Elements of distributed computing, 2002. ,
Linear temporal logic and linear dynamic logic on finite traces, Proceedings of the 23rd Int'l joint conference on artificial intelligence (IJCAI'13). IJCAI/AAAI, pp.854-860, 2013. ,
, , 2011.
Security policies and security models, IEEE symposium on security and privacy, pp.11-20, 1982. ,
Property testing-current research and surveys, LNCS, vol.6390, 2010. ,
Enforcing safety and security through non-intrusive runtime verification, Proceedings 1st workshop on security and dependability of critical embedded real-time systems, pp.19-24, 2016. ,
Norm compliance in business process modeling, Proceedings of the 4th international web rule symposium: research based and industry focused (RuleML'10), pp.194-209, 2010. ,
Selective monitoring, Proceedings 29th Int'l conference on concurrency theory (CONCUR'18), vol.118, p.16, 2018. ,
Towards formal verification of analog designs, Proceedings of the Int'l conference on computer-aided design (ICCAD'04), pp.210-217, 2004. ,
SASE: Complex event processing over streams, 2006. ,
SpaTeL: a novel spatial-temporal logic and its applications to networked systems, Proceedings of the 18th Int'l conference on hybrid systems: computation and control (HSCC'15, pp.189-198, 2015. ,
MapReduce for parallel trace validation of LTL properties, J Cloud Comput, vol.4, issue.1, p.8, 2015. ,
Verify your runs, Proceedings of the first IFIP TC 2/WG 2.3 Conference on verified software: theories, tools, experiments (VSTTE'05), vol.4171, pp.374-383, 2005. ,
Specifications are not (necessarily) executable, Softw Eng J, vol.4, issue.6, pp.330-338, 1989. ,
Value-sensitive hybrid information flow control for a Javascriptlike language, Proceedings of the IEEE 28th computer security foundations symposium (CSF'15), 2015. ,
, IEEE, pp.351-365
of NATO science for peace and security series D: information and communication security, Software safety and security, vol.33, pp.319-347, 2012. ,
What's decidable about hybrid automata, pp.373-382, 1995. ,
Software transactional memory for dynamicsized data structures, Proceedings of the 22nd ACM symposium on principles of distributed computing (PODC'03), pp.92-101, 2003. ,
Transactional memory: architectural support for lock-free data structures, SIGARCH Comput Arch News, vol.21, issue.2, pp.289-300, 1993. ,
The most dangerous code in the browser, 15th workshop on hot topics in operating systems (HotOS XV), 2015. ,
On flow-sensitive security types, Proceedings of the 33rd ACM SIGPLAN-SIGACT symposium on principles of programming languages (POPL'06), pp.79-90, 2006. ,
, IEEE P1800/D6, IEEE approved draft standard for system verilog-unified hardware design, specification, and verification language, IEEE, 2012.
, IEC 62531, IEEE Std 1850 Standard for property specification language (PSL), IEEE Standards Association, 2012.
, Intel Corporation (2016) Control-flow enforcement technology preview
Behavioral detection of malware: from a survey towards an established taxonomy, J Comput Virol, vol.4, issue.3, pp.251-266, 2008. ,
From signal temporal logic to FPGA monitors, Proceedings of the the 13th ACM/IEEE international conference on formal methods and models for codesign (MEMOCODE'15, pp.218-227, 2015. ,
Quantitative monitoring of STL with edit distance, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.201-218, 2016. ,
An algebraic framework for runtime verification, IEEE Trans CAD Integr Circuits Syst, vol.37, issue.11, pp.2233-2243, 2018. ,
Monitoring distributed systems, ACM Trans Comput Syst, vol.5, issue.2, pp.121-150, 1987. ,
Monitoring distributed systems, ACM Trans Comput Syst, vol.5, issue.2, pp.121-150, 1987. ,
, JURIX conferences
Runtime verification with particle filtering, Proceedings of the 4th Int'l conference on runtime verification (RV'13), vol.8174, pp.149-166, 2013. ,
Runtime monitoring for safety-critical embedded systems, 2015. ,
A case study on runtime monitoring of an autonomous research vehicle (ARV) system, Proceedings of the 15th international conference on runtime verification (RV'15), vol.9333, pp.102-117, 2015. ,
A simple algorithm for finding frequent elements in streams and bags, ACM Trans Database Syst, vol.28, issue.1, pp.51-55, 2003. ,
FPGA coprocessing in multi-core architectures for DSP. Altera Corporation Application Note, 2007. ,
Communication-efficient distributed monitoring of thresholded counts, Proceedings of the 2006 ACM SIGMOD Int'l conference on management of data (SIGMOD'06, pp.289-300, 2006. ,
, , 2017.
Dynamic contracts for distributed temporal logic control of traffic networks, Prceedings of the IEEE 56th annual conference on decision and control (CDC'17, pp.3640-3645, 2017. ,
dReach: ?-reachability analysis for hybrid systems, Proceedings of the 21st Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'15), vol.9035, pp.200-205, 2015. ,
Specifying real-time properties with metric temporal logic, Real Time Syst, vol.2, issue.4, pp.255-299, 1990. ,
A survey and classification of controlled natural languages, J Comput Linguist, vol.40, issue.1, pp.121-170, 2014. ,
LTL path checking is efficiently parallelizable, Proceedings of the 36th Int'l colloquium on automata, languages and programming (ICALP'09): Part II, vol.5556, pp.235-246, 2009. ,
Efficient parallel path checking for linear-time temporal logic with past and bounds, Log Methods Comput Sci, vol.8, issue.4, pp.1-24, 2012. ,
Time, clocks, and the ordering of events in a distributed system, Commun ACM, vol.21, issue.7, pp.558-565, 1978. ,
The part-time parliament, ACM Trans Comput Syst, vol.16, issue.2, pp.133-169, 1998. ,
Automata-based confidentiality monitoring, Proceedings of the 11th Asian computing science conference-secure software and related issues (ASIAN'06), vol.4435, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00130210
Hardware observability framework for minimally intrusive online monitoring of embedded systems, Proceedings 18th international conference on engineering of computer based systems (ECBS'11), pp.52-60, 2011. ,
System-level observation framework for non-intrusive runtime monitoring of embedded systems, ACM Trans Des Autom Electron Syst, vol.20, issue.42, p.27, 2015. ,
Code and other laws of cyberspace, 1999. ,
Regular linear temporal logic, Proceedings of The 4th Int'l colloquium on theoretical aspects of computing (ICTAC'07), vol.4711, pp.291-305, 2007. ,
A brief account of runtime verification, J Logi Algebraic Program, vol.78, issue.5, pp.293-303, 2009. ,
Replication in the harp file system, Proceedings of the 13th ACM symposium on operating systems principles (SOSP'91, pp.226-238, 1991. ,
Process structuring, synchronization, and recovery using atomic actions, SIGSOFT Softw Eng Notes, vol.2, issue.2, pp.128-137, 1977. ,
Deontic interpreted systems, Studia Logica, vol.75, issue.1, pp.63-92, 2003. ,
Distributed compliance monitoring of business processes over MapReduce architectures, Proceedings of the 8th ACM/SPEC Int'l conference on performance engineering companion (ICPE'17, pp.79-84, 2017. ,
Understanding the behavior of transactional memory applications, Proceedings of the 7th workshop on parallel and distributed systems: testing, analysis, and debugging (PADTAD'09), pp.31-39, 2009. ,
The power of events-an introduction to complex event processing in distributed enterprise systems, 2005. ,
Timing anomalies in dynamically scheduled microprocessors, Proceedings of the 20th IEEE real-time systems symposium (RTSS'99), 1999. ,
EnforceMOP: A runtime property enforcement system for multithreaded programs, Proceedings of the 2013 Int'l symposium on software testing and analysis (ISSTA'13, pp.156-166, 2013. ,
Monitoring temporal properties of continuous signals, Proceedings of the joint Int'l conferences on formal modelling and analysis of timed systems (FORMATS'04) and formal techniques in real-time and fault-tolerant systems (FTRTFT'04), vol.3253, pp.152-166, 2004. ,
Monitoring properties of analog and mixed-signal circuits, STTT, vol.15, issue.3, pp.247-268, 2013. ,
Finding (recently) frequent items in distributed data streams, Proceedings of the 21st Int'l conference on data engineering (ICDE'05), pp.767-778, 2005. ,
Processing flows of information: from data stream to complex event processing, Proceedings of the 5th ACM Int'l conference on distributed event-based systems (DEBS'11), 2011. ,
Eiffel: the language, 1992. ,
All IT jobs are cybersecurity jobs now, 2017. ,
Finding repeated elements, Sci Comput Program, vol.2, issue.2, pp.143-152, 1982. ,
Solving computation slicing using predicate detection, IEEE Trans Parallel Distrib Syst, vol.18, issue.12, pp.1700-1713, 2007. ,
Establishing conformance between contracts and choreographies, Proceedings of the IEEE 15th conference on business informatics (CBI'13), pp.69-78, 2013. ,
Counting large numbers of events in small registers, Commun ACM, vol.21, issue.10, pp.840-842, 1978. ,
Approximate query engines: commercial challenges and research opportunities, Proceedings of the 2017 ACM Int'l conference on management of data (SIGMOD'17, pp.521-524, 2017. ,
Snappydata: a unified cluster for streaming, transactions and interactice analytics, Proceedings of the 8th biennial conference on innovative data systems research (CIDR'17), 2017. ,
Naiad: a timely dataflow system, ACM SIGOPS 24th symposium on operating systems principles, SOSP '13, pp.439-455, 2013. ,
Bitcoin: A peer-to-peer electronic cash system, Bitcoin.org, 2008. ,
Cache memory aware priority assignment and scheduling simulation of real-time embedded systems, 2017. ,
Concurrency-preserving and sound monitoring of multi-threaded component-based systems: theory, algorithms, implementation, and evaluation, Formal Asp Comput, vol.29, issue.6, pp.951-986, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01653883
Sketching and streaming algorithms for processing massive data, ACM Crossroads, vol.19, issue.1, pp.14-19, 2012. ,
Qualitative and quantitative monitoring of spatio-temporal properties, Proceedings of the 6th Int'l conference on runtime verification (RV'15), vol.9333, pp.21-37, 2015. ,
Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems, Proceedings of the 13th ACM Int'l conference on hybrid systems: computation and control (HSCC'10, pp.211-220, 2010. ,
The HARMONIA project: hardware monitoring for automotive systems-of-systems, Proceedings of 7th Int'l symposium on leveraging applications of formal methods, verification and validation (ISoLA'16), vol.9953, pp.371-379, 2016. ,
AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic, Proceedings of the Int'l conference on tools and algorithms for the construction and analysis of systems (TACAS'18), vol.10806, pp.303-319, 2018. ,
Debug and trace for multicore SoCs: How to build an efficient and effective debug and trace system for complex, multicore SoCs, 2008. ,
A hardware approach for detecting, exposing and tolerating high level atomicity violations, Proceedings of the 24th Euromicro Int'l conference on parallel, distributed, and network-based processing (PDP'16), pp.159-167, 2016. ,
Challenges in the specification of full contracts, Proceedings of the 7th Int'l conference on integrated formal methods (iFM'09), vol.5423, pp.292-306, 2009. ,
Smooth operator: control using the smooth robustness of temporal logic, Proceedings of the 2017 IEEE conference on control technology and applications (CCTA'17, pp.1235-1240, 2017. ,
An automata-based approach to evolving privacy policies for social networks, Proceedings of the 16th Int'l conference on runtime verification (RV'16), vol.10012, pp.285-301, 2016. ,
Specification of evolving privacy policies for online social networks, Proceedings of the 23rd international symposium on temporal representation and reasoning (TIME'16), pp.70-79, 2016. ,
Timed epistemic knowledge bases for social networks, Proceedings of the 22nd Int'l symposium on formal methods (FM'18), vol.10951, pp.185-202, 2018. ,
A formal privacy policy framework for social networks, 12th International conference on software engineering and formal methods (SEFM'14), vol.8702, pp.378-392, 2014. ,
Formal verification of financial algorithms, Proceedings of the 26th Int'l conference on automated deduction (CADE'17), vol.10395, pp.26-41, 2017. ,
Ananta: cloud scale load balancing, Proceedings of the ACM SIGCOMM 2013 conference (SIGCOMM '13), SIGCOMM '13. ACM, pp.207-218, 2013. ,
Hardware runtime monitoring for dependable COTS-based real-time embedded systems, Proceedings of the IEEE real-time systems symposium (RTSS'08), pp.481-491, 2008. ,
A semantic framework for mode change protocols, Proceedings of the 17th IEEE real-time and embedded technology and applications symposium (RTAS'11), pp.91-100, 2011. ,
, After you, please: browser extensions order attacks and countermeasures. CoRR -arXiv.org, 2019.
Runtime verification for ultra-critical systems, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.310-324, 2011. ,
Runtime verification of hyperproperties for deterministic programs, Proceedings of the 6th Int'l conference on formal methods in software engineering (For-maliSE'18), 2018. ,
Towards non-invasive runtime verification of real-time systems, Proceedings of the 26th Euromicro conference on real-time systems-WIP session, pp.25-28, 2014. ,
PSL model checking and run-time verification via testers, Proceedings of the 14th Int'l symposium on formal methods (FM'06), vol.4085, pp.573-586, 2006. ,
Formalising arguments about norms, Proceedings of the 26th annual conference on legal knowledge and information systems (JURIX'13), vol.259, pp.121-130, 2013. ,
A dynamic deontic logic for complex contracts, J Log Algebraic Program, vol.81, issue.4, pp.458-490, 2012. ,
Runtime verification for business processes utilizing the Bitcoin Blockchain, 2017. ,
Adaptable intrusion detection using partial runtime reconfiguration, Proceedings of the IEEE 30th Int'l conference on computer design (ICCD'12), pp.147-152, 2012. ,
Model predictive control with signal temporal logic specifications, Proceedings of the 53rd annual conference on decision and control (CDC'14, pp.81-87, 2014. ,
Reactive synthesis from signal temporal logic specifications, Proceedings HSCC'15: the 18th international conference on hybrid systems: computation and control, pp.239-248, 2015. ,
DeSTM: harnessing determinism in STMs for application development, Proceedings of the Int'l conference on parallel architectures and compilation (PACT), pp.213-224, 2014. ,
From first-order temporal logic to parametric trace slicing, Proceedings of the 6th Int'l conference on runtime verification (RV'15), pp.216-232, 2015. ,
Runtime verification of embedded real-time systems, Formal Methods Syst Des, vol.24, issue.3, pp.203-239, 2014. ,
Temporal-logic based runtime observer pairs for system health management of real-time systems, Proceedings 20th international conference on tools and algorithms for the construction and analysis of systems (TACAS'14), vol.8413, pp.357-372, 2014. ,
Reliable smart contracts: State-of-the-art, applications, challenges and future directions, Isola2018-SmartContracts. ISoLA'18 track, 2013. ,
On a continuous degree of satisfaction of temporal logic formulae with applications to systems biology, Proceedings of the 6th Int'l conference on computational methods in systems biology (CMSB'08), vol.5307, pp.251-268, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00419781
Temporal logic as filtering, Proceedings of HSCC 2016: the 19th International conference on hybrid systems: computation and control, pp.11-20, 2016. ,
Towards integration of adaptability and non-intrusive runtime verification in avionic systems, ACM SIGBED Rev, vol.13, issue.1, pp.60-65, 2016. ,
Timeliness runtime verification and adaptation in avionic systems, Proceedings of the 12th workshop on operating systems platforms for embedded real-time applications (OSPERT'16), pp.14-20, 2016. ,
Dynamic vs. static flow-sensitive security analysis, Proceedings of the 23rd IEEE computer security foundations symposium (CSF'10), pp.186-199, 2010. ,
Language-based information-flow security, J Sel Areas Commun, vol.21, issue.1, pp.5-19, 2003. ,
Colluding browser extension attack on user privacy and its implication for web browsers, Comput Secur, vol.63, pp.14-28, 2016. ,
A survey of insider attack detection research, Insider attack and cyber security-beyond the hacker, pp.69-90, 2008. ,
Regular linear temporal logic with past, Proceedings of the 11th Int'l conference on verification, model checking, and abstract interpretation, vol.5944, pp.295-311, 2010. ,
Hybrid Typing of Secure Information Flow in a JavaScriptlike Language, Proceedings of the 10th Int'l symposium on on trustworthy global computing (TGC'15), vol.9533, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01243029
Implementing fault-tolerant services using the state machine approach: a tutorial, ACM Comput Surv, vol.22, issue.4, pp.299-319, 1990. ,
Distributed complex event processing with query rewriting, Proceedings of the 3rd ACM Int'l conference on distributed event-based systems (DEBS'09, vol.4, p.12, 2009. ,
Runtime monitoring with recovery of the SENT communication protocol, Proceedings of the the 29th Int'l conference on computer aided verification (CAV'17), vol.10426, pp.336-355, 2017. ,
Efficient decentralized monitoring of safety in distributed systems, Proceedings of 26th Int'l conference on software engineering (ICSE, pp.418-427, 2004. ,
A survey of data leakage detection and prevention solutions. Springer briefs in computer science, 2012. ,
Using Paxos to build a scalable, consistent, and highly available datastore, Proc VLDB Endow, vol.4, issue.4, pp.243-254, 2011. ,
A hardware and software monitor for high-level system-on-chip verification, Proceedings of the 2nd IEEE Int'l symposium on quality electronic design, pp.56-61, 2001. ,
Adaptive schema databases, Proceedings of the 8th biennial Int'l on innovative data systems research (CIDR'17, 2017. ,
Runtime verification with state estimation, Proceedings of the 2nd Int'l conference on runtime verification (RV'11), vol.7186, pp.193-207, 2011. ,
WannaCry-the largest ransom-ware infection in history, 2017. ,
Smart contracts: building blocks for digital markets, Extropy, vol.16, 1996. ,
In-circuit temporal monitors for runtime verification of reconfigurable designs, Proceedings of the 52nd annual design automation conference (DAC'15, vol.50, pp.1-50, 2015. ,
Decentralized composite access control, Proceedings of the 3rd Int'l conference principles of security and trust (POST'14), vol.8414, pp.245-264, 2014. ,
Timed pattern matching, Proceedings of the 12th Int'l conference on Formal modeling and analysis of timed systems (FORMATS'14), vol.8711, pp.222-236, 2014. ,
Online timed pattern matching using derivatives, Proceedings of TACAS'16, vol.9636, pp.736-751, 2016. ,
Rifle: An architectural framework for user-centric information-flow security, Proceedings of the 37th Int'l symposium on microarchitecture (MICRO'04), pp.243-254, 2004. ,
Pot: Deterministic transactional execution, ACM Trans Arch Code Optim, vol.13, issue.4, p.24, 2016. ,
Distributed process discovery and conformance checking, Proceedings of the 15th Int'l conference on fundamental approaches to software engineering (FASE'12), vol.7212, pp.1-25, 2012. ,
Church and Prior to PSL. In: 25 Years of model checking-history, achievements, perspectives, LNCS. Springer, vol.5000, pp.150-171, 2008. ,
Foundations for the run-time analysis of software systems, 2000. ,
A sound type system for secure flow analysis, J Comput Secur, vol.4, issue.2-3, pp.167-187, 1996. ,
Runtime verification and monitoring of embedded systems, IET Softw, vol.1, issue.5, pp.172-179, 2007. ,
Untrusted business process monitoring and execution using Blockchain, Proceedings of the 14th Int'l conference on business process management (BPM'16), vol.9850, pp.329-347, 2016. ,
Ceph: a scalable, high-performance distributed file system, Proceedings of the 7th symposium on operating systems design and implementation (OSDI'06), OSDI '06. USENIX Association, pp.307-320, 2006. ,
What is "next" in event processing, Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS'07), 2007. ,
The worst-case execution time problem-overview of methods and survey of tools, ACM Trans Embed Comput Syst, vol.7, issue.3, p.36, 2008. ,
Receding horizon temporal logic planning, IEEE Trans Autom Control, vol.57, issue.11, pp.2817-2830, 2012. ,
Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, vol.151, pp.1-32, 2014. ,
Tight bounds for distributed functional monitoring, Proceedings of the 44th annual acm symposium on theory of computing (STOC'12), pp.941-960, 2012. ,
, Deontic logic. Mind, vol.60, pp.1-15, 1951.
From the language of legislation to executable logic programs, Logic in the theory and practice of lawmaking, vol.2, pp.409-434, 2015. ,
On controlled natural languages: properties and prospects, CNL'09, vol.5972, pp.281-289, 2009. ,
Mining Requirements from closed-loop control models, Proceedings of the ACM international conference on hybrid systems: computation and control (HSCC'13, pp.43-52, 2013. ,
Salt: combining ACID and BASE in a distributed database, Proceedings of the 11th USENIX conference on operating systems design and implementation (OSDI'14). USENIX Association, pp.495-509, 2014. ,
High-performance ACID via modular concurrency control, Proceedings of the 25th symposium on operating systems principles (SOSP'15), 2015. ,
Hybrid approximate gradient and stochastic descent for falsification of nonlinear systems, Proceedings the 2017 American control conference (ACC'17, pp.529-534, 2017. ,
Querying parametric temporal logic properties on embedded systems, Proceedings of the 24th IFIP WG 6.1 Int'l conference on testing software and systems (ICTSS'12), vol.7641, pp.136-151, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01482426
) Precise, dynamic information flow for database-backed applications, Proceedings of the 37th ACM SIGPLAN conference on programming language design and implementation (PLDI'16, pp.631-647, 2016. ,
A survey on malware detection using data mining techniques, ACM Comput Surv, vol.50, issue.3, 2017. ,
Optimal tracking of distributed heavy hitters and quantiles, Algorithmica, vol.65, issue.1, pp.206-223, 2013. ,
Verifying temporal properties of programs: a parallel approach, J Parallel Distrib Comput, vol.118, pp.89-99, 2017. ,
Spark: Cluster computing with working sets, Proceedings of the 2nd USENIX Workshop on hot topics in cloud computing (HotCloud'10). USENIX Association, 2010. ,
, Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations