Follow
Felix Klaedtke
Felix Klaedtke
NEC Labs Europe
Verified email at neclab.eu
Title
Cited by
Cited by
Year
Monitoring metric first-order temporal properties
D Basin, F Klaedtke, S Müller, E Zălinescu
Journal of the ACM (JACM) 62 (2), 1-45, 2015
2202015
MONPOLY: Monitoring usage-control policies
D Basin, M Harvan, F Klaedtke, E Zălinescu
Runtime Verification: Second International Conference, RV 2011, San …, 2012
1142012
Policy monitoring in first-order temporal logic
D Basin, F Klaedtke, S Müller
Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010
1142010
Monadic second-order logics with cardinalities
F Klaedtke, H Rueß
Automata, Languages and Programming: 30th International Colloquium, ICALP …, 2003
1092003
Runtime monitoring of metric first-order temporal properties
D Basin, F Klaedtke, S Müller, B Pfitzmann
IARCS Annual Conference on Foundations of Software Technology and …, 2008
1042008
A security architecture for 5G networks
G Arfaoui, P Bisson, R Blom, R Borgaonkar, H Englund, E Félix, ...
IEEE access 6, 22466-22479, 2018
1012018
First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014
E Bartocci, Y Falcone, B Bonakdarpour, C Colombo, N Decker, ...
International journal on software tools for technology transfer 21, 31-70, 2019
942019
Monitoring security policies with metric first-order temporal logic
D Basin, F Klaedtke, S Müller
Proceedings of the 15th ACM symposium on Access control models and …, 2010
942010
Enforceable security policies revisited
D Basin, V Jugé, F Klaedtke, E Zălinescu
ACM Transactions on Information and System Security (TISSEC) 16 (1), 1-26, 2013
912013
The MonPoly Monitoring Tool.
DA Basin, F Klaedtke, E Zalinescu
RV-CuBES 3, 19-28, 2017
852017
Algorithms for monitoring real-time properties
D Basin, F Klaedtke, E Zălinescu
International Conference on Runtime Verification, 260-275, 2011
762011
On the fingerprinting of software-defined networks
H Cui, GO Karame, F Klaedtke, R Bifulco
IEEE Transactions on Information Forensics and Security 11 (10), 2160-2173, 2016
682016
Monitoring of temporal first-order properties with aggregations
D Basin, F Klaedtke, S Marinovic, E Zălinescu
Formal methods in system design 46, 262-285, 2015
662015
Access control for SDN controllers
F Klaedtke, GO Karame, R Bifulco, H Cui
Proceedings of the third workshop on Hot topics in software defined …, 2014
652014
Monitoring compliance policies over incomplete and disagreeing logs
D Basin, F Klaedtke, S Marinovic, E Zălinescu
Runtime Verification: Third International Conference, RV 2012, Istanbul …, 2013
492013
Optimizing bounded model checking for linear hybrid systems
E Abrahám, B Becker, F Klaedtke, M Steffen
International Workshop on Verification, Model Checking, and Abstract …, 2005
492005
On the automata size for Presburger arithmetic
F Klaedtke
Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science …, 2004
472004
Scalable offline monitoring
D Basin, G Caronni, S Ereth, M Harvan, F Klaedtke, H Mantel
Runtime Verification: 5th International Conference, RV 2014, Toronto, ON …, 2014
462014
LIRA: Handling Constraints of Linear Arithmetics over the Integers and the Reals: (Tool Paper)
B Becker, C Dax, J Eisinger, F Klaedtke
International Conference on Computer Aided Verification, 307-310, 2007
452007
Parikh automata and monadic second-order logics with linear cardinality constraints
F Klaedtke, H Rueß
Univ., Inst. für Informatik, 2001
442001
The system can't perform the operation now. Try again later.
Articles 1–20