Titolo |
Pubblicato in |
Anno |
Reliable Broadcast Despite Mobile Byzantine Faults |
27th International Conference on Principles of Distributed Systems (OPODIS 2023) |
2024 |
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies |
19th International Conference on Availability, Reliability and Security (ARES 2024) |
2024 |
Reliable Communication in Dynamic Networks with Locally Bounded Byzantine Faults |
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING |
2024 |
A compliance assessment system for Incident Management process |
COMPUTERS & SECURITY |
2024 |
Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools |
43rd International Conference on Safety, Reliability and Security of Computer-based Systems, SAFECOMP 2024 |
2024 |
How to assess measurement capabilities of a security monitoring infrastructure and plan investment through a graph-based approach |
EXPERT SYSTEMS WITH APPLICATIONS |
2024 |
A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability Inventories |
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR) |
2024 |
Optimal self-stabilizing mobile byzantine-tolerant regular register with bounded timestamps |
THEORETICAL COMPUTER SCIENCE |
2023 |
A workflow for distributed and resilient Attack Graph generation |
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) |
2023 |
A MULTI-LAYER ATTACK MODEL INTEGRATING HUMAN FACTORS IN DELIVERING CYBERSECURITY |
STRATEGIC LEADERSHIP JOURNAL |
2023 |
Comment extraire un discours cohérent de la confusion générale |
AlgoTel 2023 - 25èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications |
2023 |
Special issue on algorithmic theory of dynamic networks and Its applications |
JOURNAL OF COMPUTER AND SYSTEM SCIENCES |
2022 |
Context-Aware Trace Alignment with Automated Planning |
Proceedings of the 4th International Conference on Process Mining, ICPM 2022 |
2022 |
Broadcasting Information in Multi-hop Networks Prone to Mobile Byzantine Faults |
Networked Systems. 8th International Conference, NETYS 2020, Marrakech, Morocco, June 3–5, 2020, Proceedings |
2021 |
Toward a Context-Aware Methodology for Information Security Governance Assessment Validation |
Cyber-Physical Security for Critical Infrastructures Protection |
2021 |
Emerging and Established Trends to Support Secure Health Information Exchange |
FRONTIERS IN DIGITAL HEALTH |
2021 |
Cyberthreats to Hospitals: Panacea, a Toolkit for People-Centric Cybersecurity |
STRATEGIC INNOVATION AND SUSTAINABILITY |
2021 |
Practical Byzantine Reliable Broadcast on Partially Connected Networks |
2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) |
2021 |
BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS |
2021 IEEE Symposium on Visualization for Cyber Security (VizSec) |
2021 |
B-CoC: A blockchain-based chain of custody for evidences management in digital forensics |
International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019) |
2020 |