Monitoring the operation of complex softare systems at runtime can detect violations of certain properties of interest but cannot always provide diagnostic information which is significant for understanding the cause of the violation and the adoption of appropriate countermeasures against it. In this paper, we describe a process for diagnosing runtime violations of security and dependability properties that we have developed as part of a general runtime monitoring framework that is based on Event Calculus. The diagnosis generation process is based on a combination of abductive, temporal and evidential reasoning over violations of system properties
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Trace checking is a verification technique widely used in Cyber-physical system (CPS) development, t...
peer reviewedTrace checking is a verification technique widely used in Cyber-physical system (CPS) d...
Monitoring the preservation of security and dependability (S&D) properties during the operation of s...
Monitoring security properties of cyber systems at runtime is necessary if the preservation of such ...
Runtime monitoring is performed during system execution to detect whether the system’s behaviour dev...
International audienceThis chapter describes how to use in-the-field runtime techniques to improve t...
International audienceThe underlying property, its definition and representation play a major role w...
In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also...
We define a logical framework that permits runtime verification to take place when a monitor has inc...
The design of runtime verification (or monitoring) systems presents a myriad of options — how to ins...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Trace checking is a verification technique widely used in Cyber-physical system (CPS) development, t...
peer reviewedTrace checking is a verification technique widely used in Cyber-physical system (CPS) d...
Monitoring the preservation of security and dependability (S&D) properties during the operation of s...
Monitoring security properties of cyber systems at runtime is necessary if the preservation of such ...
Runtime monitoring is performed during system execution to detect whether the system’s behaviour dev...
International audienceThis chapter describes how to use in-the-field runtime techniques to improve t...
International audienceThe underlying property, its definition and representation play a major role w...
In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also...
We define a logical framework that permits runtime verification to take place when a monitor has inc...
The design of runtime verification (or monitoring) systems presents a myriad of options — how to ins...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Formal methods have been used to establish the idea of safety and monitorable properties. Drawing fr...
Trace checking is a verification technique widely used in Cyber-physical system (CPS) development, t...
peer reviewedTrace checking is a verification technique widely used in Cyber-physical system (CPS) d...