The SERENITY Runtime Monitoring Framework
暂无分享,去创建一个
[1] Brian Randell,et al. Fundamental Concepts of Dependability , 2000 .
[2] Grigore Rosu,et al. Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation , 2003, RV@CAV.
[3] George Spanoudakis,et al. Run-time monitoring of requirements for systems composed of Web-services: initial implementation and evaluation experience , 2005, IEEE International Conference on Web Services (ICWS'05).
[4] Dov M. Gabbay,et al. A Logical Framework for Monitoring and Evolving Software Components , 2007, First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE '07).
[5] Grigore Rosu,et al. An Overview of the Runtime Verification Tool Java PathExplorer , 2004, Formal Methods Syst. Des..
[6] George Spanoudakis,et al. Monitoring WS-Agreement s: An Event Calculus-Based Approach , 2007, Test and Analysis of Web Services.
[7] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[8] Carsten Rudolph,et al. Security Engineering for Ambient Intelligence: A Manifesto , 2006 .
[9] Qi Zhang,et al. Indra: A Distributed Approach to Network Intrusion Detection and Prevention , 2001 .
[10] George Spanoudakis,et al. Towards security monitoring patterns , 2007, SAC '07.
[11] Reihaneh Safavi-Naini,et al. Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[12] Vladimir Gudkov,et al. Multidimensional Network Monitoring for Intrusion Detection , 2002, ArXiv.
[13] Dov M. Gabbay,et al. From Runtime Verification to Evolvable Systems , 2007, RV.
[14] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[15] George Spanoudakis,et al. A framework for requirents monitoring of service based systems , 2004, ICSOC '04.
[16] George Spanoudakis,et al. Non-Intrusive Monitoring of Service-Based Systems , 2006, Int. J. Cooperative Inf. Syst..
[17] Mauricio G. C. Resende,et al. An implementation of Karmarkar's algorithm for linear programming , 1989, Math. Program..
[18] George Spanoudakis,et al. Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework , 2009, Security and Dependability for Ambient Intelligence.
[19] Stephen E. Hansen,et al. Automated System Monitoring and Notification with Swatch , 1993, LISA.
[20] Axel van Lamsweerde,et al. Divergent views in goal-driven requirements engineering , 1996, ISAW/Viewpoints@FSE.
[21] Murray Shanahan,et al. The Event Calculus Explained , 1999, Artificial Intelligence Today.
[22] Stuart Staniford-chen,et al. The Common Intrusion Detection Framework - Data Formats , 1998 .
[23] Antonio Maña,et al. Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges , 2009, Security and Dependability for Ambient Intelligence.
[24] Mary Grammatikou,et al. An Architectural Framework for Distributed Intrusion Detection Using Smart Agents , 2004, Security and Management.
[25] Luciano Baresi,et al. Dynamo: Dynamic Monitoring of WS-BPEL Processes , 2005, ICSOC.
[26] Schahram Dustdar,et al. Non-intrusive monitoring and service adaptation for WS-BPEL , 2008, WWW.