Runtime Verification Under Access Restrictions | IEEE Conference Publication | IEEE Xplore