82 results on '"Colombo, Christian"'
Search Results
2. Reactive Runtime Monitoring
3. Manual Monitoring
4. Conclusions
5. Runtime Verification
6. What is Runtime Verification
7. Other Advanced Topics
8. Event Guarded Command Language
9. D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
10. The Need for Verification
11. Aspect-Oriented Programming
12. Monitoring Real-Time Properties
13. Regular Expressions
14. Symbolic Automata
15. Linear Temporal Logic
16. Offline Runtime Verification
17. Secure Implementation of a Quantum-Future GAKE Protocol
18. Runtime Verification: Passing on the Baton
19. Model-Based Static and Runtime Verification for Ethereum Smart Contracts
20. Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
21. Reducing the Forensic Footprint with Android Accessibility Attacks
22. Secure Communication in the Quantum Era: (Group) Key Establishment
23. Runtime Verification of Contracts with Themulus
24. Runtime Verification for Trustworthy Computing
25. Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges
26. Considering Academia-Industry Projects Meta-characteristics in Runtime Verification Design
27. Contracts over Smart Contracts: Recovering from Violations Dynamically
28. COST Action IC1402 Runtime Verification Beyond Monitoring
29. Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications
30. Compliance Checking in the Open Payments Ecosystem
31. A Model-Based Approach to Combining Static and Dynamic Verification Techniques
32. An Automata-Based Approach to Evolving Privacy Policies for Social Networks
33. First International Summer School on Runtime Verification
34. Runtime Verification for Stream Processing Applications
35. A Controlled Natural Language for Tax Fraud Detection
36. RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.
37. Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps
38. A Controlled Natural Language for Business Intelligence Monitoring
39. Investigating Instrumentation Techniques for ESB Runtime Verification
40. Organising LTL Monitors over Distributed Systems with a Global Clock
41. Runtime verification for trustworthy secure shell deployment
42. RV-TEE: secure cryptographic protocol execution based on runtime verification
43. Risk parity with expectiles
44. Fast-Forward Runtime Monitoring — An Industrial Case Study
45. SMock — A Test Platform for Monitoring Tools
46. Preface
47. PoPL: Proof-of-Presence and Locality, or how to secure financial transactions on your smartphone.
48. Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android
49. Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android
50. polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.