1. Privacy-Preserving Data Mining: Models and Algorithms;Aggarwal,2008
2. Ancona, D., Briola, D., Ferrando, A., Mascardi, V., 2016. MAS-drive: A practical approach to decentralized runtime verification of agent interaction protocols. Vol. 1664, pp. 35–43.
3. The bones of the system: A case study of logging and telemetry at microsoft;Barik,2016
4. Adaptive runtime verification;Bartocci,2012
5. Monitoring deployed software using software tomography;Bowring,2002