{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:38:00Z","timestamp":1742981880852,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030873479"},{"type":"electronic","value":"9783030873486"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87348-6_5","type":"book-chapter","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T18:08:32Z","timestamp":1634494112000},"page":"89-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Runtime Verification: Passing on the Baton"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2844-5728","authenticated-orcid":false,"given":"Christian","family":"Colombo","sequence":"first","affiliation":[]},{"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0629-6853","authenticated-orcid":false,"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, S., Bonakdarpour, B.: Runtime verification of $$k$$-safety hyperproperties in HyperLTL. In: CSF 2016, pp. 239\u2013252. IEEE CS Press (2016)","key":"5_CR1","DOI":"10.1109\/CSF.2016.24"},{"doi-asserted-by":"crossref","unstructured":"Azzopardi, S., Colombo, C., Pace, G.J.: Control-flow residual analysis for symbolic automata. In: PrePost@iFM 2017, Volume 254 of EPTCS, pp. 29\u201343 (2017)","key":"5_CR2","DOI":"10.4204\/EPTCS.254.3"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s10703-017-0274-y","volume":"51","author":"W Ahrendt","year":"2017","unstructured":"Ahrendt, W., Chimento, J.M., Pace, G.J., Schneider, G.: Verifying data- and control-oriented properties combining static and runtime verification: theory and tools. Formal Methods Syst. Des. 51(1), 200\u2013265 (2017). https:\/\/doi.org\/10.1007\/s10703-017-0274-y","journal-title":"Formal Methods Syst. Des."},{"doi-asserted-by":"crossref","unstructured":"Bonakdarpour, B., Finkbeiner, B.: The complexity of monitoring hyperproperties. In: CSF 2018, pp. 162\u2013174. IEEE CS Press (2018)","key":"5_CR4","DOI":"10.1109\/CSF.2018.00019"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10009-017-0454-5","volume":"21","author":"E Bartocci","year":"2019","unstructured":"Bartocci, E., et al.: First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014. Int. J. Softw. Tools Technol. Transf. 21(1), 31\u201370 (2019). https:\/\/doi.org\/10.1007\/s10009-017-0454-5","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16612-9","volume-title":"Runtime Verification","year":"2010","unstructured":"Barringer, H., et al. (eds.): RV 2010. LNCS, vol. 6418. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5"},{"doi-asserted-by":"crossref","unstructured":"Barringer, H., Groce, A., Havelund, K., Smith, M.H.: An entry point for formal methods: specification and analysis of event logs. In: FMA 2009, Volume 20 of EPTCS, pp. 16\u201321 (2009)","key":"5_CR9","DOI":"10.4204\/EPTCS.20.2"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TSE.2010.25","volume":"36","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Havelund, K.: Aspect-oriented race detection in Java. IEEE Trans. Softw. Eng. 36(4), 509\u2013527 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-16612-9_8","volume-title":"Runtime Verification","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Lam, P.: Clara: partially evaluating runtime monitors at compile time. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 74\u201388. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_8"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-77395-5_11","volume-title":"Runtime Verification","author":"A Bauer","year":"2007","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 126\u2013138. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77395-5_11"},{"issue":"4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 14 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"5_CR14","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1145\/321239.321249","volume":"11","author":"JA Brzozowski","year":"1964","unstructured":"Brzozowski, J.A.: Derivatives of regular expressions. J. ACM 11(4), 481\u2013494 (1964)","journal-title":"J. ACM"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-662-54580-5_5","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"N Brett","year":"2017","unstructured":"Brett, N., Siddique, U., Bonakdarpour, B.: Rewriting-based runtime verification for alternation-free HyperLTL. In: Legay, A., Margaria, T. (eds.) TACAS 2017. LNCS, vol. 10206, pp. 77\u201393. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54580-5_5"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23820-3_21","volume-title":"Runtime Verification","author":"JM Chimento","year":"2015","unstructured":"Chimento, J.M., Ahrendt, W., Pace, G.J., Schneider, G.: StaRVOOrS\u202f: a tool for combined static and runtime verification of Java. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 297\u2013305. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_21"},{"doi-asserted-by":"crossref","unstructured":"Chimento, J.M., Ahrendt, W., Schneider, G.: Testing meets static and runtime verification. In: FormaliSE 2018, pp. 30\u201339. ACM (2018)","key":"5_CR17","DOI":"10.1145\/3193992.3194000"},{"doi-asserted-by":"crossref","unstructured":"Cauchi, A., Colombo, C., Francalanza, A., Micallef, M., Pace, G.J.: Using gherkin to extract tests and monitors for safer medical device interaction design. In: ACM SIGCHI EICS 2016, pp. 275\u2013280. ACM (2016)","key":"5_CR18","DOI":"10.1145\/2933242.2935868"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-54792-8_15","volume-title":"Principles of Security and Trust","author":"MR Clarkson","year":"2014","unstructured":"Clarkson, M.R., Finkbeiner, B., Koleini, M., Micinski, K.K., Rabe, M.N., S\u00e1nchez, C.: Temporal logics for hyperproperties. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 265\u2013284. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54792-8_15"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-030-03427-6_5","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"C Colombo","year":"2018","unstructured":"Colombo, C., Pace, G.J.: Considering academia-industry projects meta-characteristics in runtime verification design. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 32\u201341. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_5"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-319-75632-5_7","volume-title":"Lectures on Runtime Verification","author":"C Colombo","year":"2018","unstructured":"Colombo, C., Pace, G.J.: Industrial experiences with runtime verification of financial transaction systems: lessons learnt and standing challenges. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 211\u2013232. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_7"},{"issue":"3","key":"5_CR22","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10703-012-0142-8","volume":"41","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Pace, G.J., Abela, P.: Safer asynchronous runtime monitoring using compensations. Formal Methods Syst. Des. 41(3), 269\u2013294 (2012). https:\/\/doi.org\/10.1007\/s10703-012-0142-8","journal-title":"Formal Methods Syst. Des."},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-03240-0_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"C Colombo","year":"2009","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Dynamic event-based runtime monitoring of real-time and contextual properties. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 135\u2013149. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03240-0_13"},{"doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: LARVA \u2013 safer monitoring of real-time Java programs (tool paper). In: SEFM 2009, pp. 33\u201337. IEEE Computer Society (2009)","key":"5_CR24","DOI":"10.1109\/SEFM.2009.13"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-04368-0_10","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"C Colombo","year":"2009","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Safe runtime verification of real-time properties. In: Ouaknine, J., Vaandrager, F.W. (eds.) FORMATS 2009. LNCS, vol. 5813, pp. 103\u2013117. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04368-0_10"},{"doi-asserted-by":"crossref","unstructured":"Chen, F., Rosu, G.: Towards monitoring-oriented programming: a paradigm combining specification and implementation. In: RV 2003, vol. 89, pp. 108\u2013127. ENTCS (2003)","key":"5_CR26","DOI":"10.1016\/S1571-0661(04)81045-4"},{"doi-asserted-by":"crossref","unstructured":"Chen, F., Serbanuta, T.-F., Rosu, G.: jPredictor: a predictive runtime analysis tool for Gava. In: ICSE 2008, pp. 221\u2013230. ACM (2008)","key":"5_CR27","DOI":"10.1145\/1368088.1368119"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-38088-4_34","volume-title":"NASA Formal Methods","author":"N Decker","year":"2013","unstructured":"Decker, N., Leucker, M., Thoma, D.: jUnitRV\u2013adding runtime verification to jUnit. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 459\u2013464. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38088-4_34"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/10722468_19","volume-title":"SPIN Model Checking and Software Verification","author":"D Drusinsky","year":"2000","unstructured":"Drusinsky, D.: The temporal rover and the ATG rover. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 323\u2013330. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10722468_19"},{"key":"5_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-04694-0_4","volume-title":"Runtime Verification","author":"Y Falcone","year":"2009","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Runtime verification of safety-progress properties. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 40\u201359. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04694-0_4"},{"issue":"3","key":"5_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10009-011-0196-8","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: What can you verify and enforce at runtime? Int. J. Softw. Tools Technol. Transf. (STTT) 14(3), 349\u2013382 (2012). https:\/\/doi.org\/10.1007\/s10009-011-0196-8","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-67531-2_12","volume-title":"Runtime Verification","author":"B Finkbeiner","year":"2017","unstructured":"Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 190\u2013207. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_12"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-030-03769-7_14","volume-title":"Runtime Verification","author":"Y Falcone","year":"2018","unstructured":"Falcone, Y., Krsti\u0107, S., Reger, G., Traytel, D.: A taxonomy for classifying runtime verification tools. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 241\u2013262. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_14"},{"unstructured":"Giannakopoulou, D., Havelund, K.: Automata-based verification of temporal properties on running programs. In: ASE 2001, pp. 412\u2013416. IEEE Computer Society (2001)","key":"5_CR34"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/10722468_20","volume-title":"SPIN Model Checking and Software Verification","author":"JJ Harrow","year":"2000","unstructured":"Harrow, J.J.: Runtime checking of multithreaded applications with visual threads. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 331\u2013342. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10722468_20"},{"issue":"2","key":"5_CR36","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10009-014-0309-2","volume":"17","author":"K Havelund","year":"2015","unstructured":"Havelund, K.: Rule-based runtime verification revisited. Int. J. Softw. Tools Technol. Transf. 17(2), 143\u2013170 (2015). https:\/\/doi.org\/10.1007\/s10009-014-0309-2","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"5_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-030-03769-7_7","volume-title":"Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Peled, D.: Runtime verification: from propositional to first-order temporal logic. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 90\u2013112. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_7"},{"issue":"2","key":"5_CR38","first-page":"200","volume":"55","author":"K Havelund","year":"2001","unstructured":"Havelund, K., Rosu, G.: Monitoring Java programs with Java PathExplorer. ENTCS 55(2), 200\u2013217 (2001)","journal-title":"ENTCS"},{"doi-asserted-by":"crossref","unstructured":"Havelund, K., Rosu, G.: Monitoring programs using rewriting. In: ASE 2001, pp. 135\u2013143 (2001)","key":"5_CR39","DOI":"10.1109\/ASE.2001.989799"},{"key":"5_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-46002-0_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K Havelund","year":"2002","unstructured":"Havelund, K., Ro\u015fu, G.: Synthesizing monitors for safety properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol. 2280, pp. 342\u2013356. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46002-0_24"},{"key":"5_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-03769-7_1","volume-title":"Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Ro\u015fu, G.: Runtime verification - 17 years later. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 3\u201317. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_1"},{"key":"5_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1007\/978-3-319-91908-9_25","volume-title":"Computing and Software Science","author":"K Havelund","year":"2019","unstructured":"Havelund, K., Reger, G., Ro\u015fu, G.: Runtime verification past experiences and future projections. In: Steffen, B., Woeginger, G. (eds.) Computing and Software Science. LNCS, vol. 10000, pp. 532\u2013562. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-91908-9_25"},{"unstructured":"Havelund, K., Van Wyk, E.: Aspect-oriented monitoring of C programs. In: IARP-IEEE\/RAS-EURON 2008 (2008)","key":"5_CR43"},{"doi-asserted-by":"crossref","unstructured":"Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswanathan, M.: Computational analysis of run-time monitoring - fundamentals of Java-MaC. In: RV 2002, Volume 70 of ENTCS, pp. 80\u201394 (2002)","key":"5_CR44","DOI":"10.1016\/S1571-0661(04)80578-4"},{"key":"5_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-29860-8_4","volume-title":"Runtime Verification","author":"M Leucker","year":"2012","unstructured":"Leucker, M.: Teaching runtime verification. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 34\u201348. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_4"},{"doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Preoteasa, V., Tripakis, S., J\u00e9ron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. In: ACM SAC 2016, pp. 1628\u20131633. ACM (2016)","key":"5_CR46","DOI":"10.1145\/2851613.2851827"},{"key":"5_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11813040_38","volume-title":"FM 2006: Formal Methods","author":"A Pnueli","year":"2006","unstructured":"Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573\u2013586. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11813040_38"},{"doi-asserted-by":"crossref","unstructured":"Sammapun, U., Easwaran, A., Lee, I., Sokolsky, O.: Simulation of simultaneous events in regular expressions for run-time verification. In: RV 2004, Volume 113 of ENTCS, pp. 123\u2013143 (2005)","key":"5_CR48","DOI":"10.1016\/j.entcs.2004.01.030"},{"issue":"3","key":"5_CR49","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10703-019-00337-w","volume":"54","author":"C S\u00e1nchez","year":"2019","unstructured":"S\u00e1nchez, C., et al.: A survey of challenges for runtime verification from advanced application domains (beyond software). Formal Methods Syst. Des. 54(3), 279\u2013335 (2019). https:\/\/doi.org\/10.1007\/s10703-019-00337-w","journal-title":"Formal Methods Syst. Des."},{"key":"5_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-030-30942-8_25","volume-title":"Formal Methods \u2013 The Next 30 Years","author":"S Stucki","year":"2019","unstructured":"Stucki, S., S\u00e1nchez, C., Schneider, G., Bonakdarpour, B.: Gray-box monitoring of hyperproperties. In: ter Beek, M.H., McIver, A., Oliveira, J.N. (eds.) FM 2019. LNCS, vol. 11800, pp. 406\u2013424. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30942-8_25"},{"key":"5_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-642-28891-3_37","volume-title":"NASA Formal Methods","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Leucker, M., Dong, W.: Runtime verification with predictive semantics. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 418\u2013432. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28891-3_37"}],"container-title":["Lecture Notes in Computer Science","Formal Methods in Outer Space"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87348-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T02:22:06Z","timestamp":1725934926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87348-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030873479","9783030873486"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87348-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}