Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marco Rocchetto
@inproceedings{DBLP:conf/acns/AmbrosiBMNPR22, author = {Michele Ambrosi and Francesco Beltramini and Federico De Meo and Oliviero Nardi and Mattia Pacchin and Marco Rocchetto}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {The Etiology of Cybersecurity}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {299--319}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_17}, doi = {10.1007/978-3-031-16815-4\_17}, timestamp = {Tue, 27 Sep 2022 16:52:52 +0200}, biburl = {https://dblp.org/rec/conf/acns/AmbrosiBMNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/RocchettoFS19, author = {Marco Rocchetto and Alberto Ferrari and Valerio Senni}, editor = {Francesco Flammini}, title = {Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems}, booktitle = {Resilience of Cyber-Physical Systems, From Risk Modelling to Threat Counteraction}, pages = {25--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-319-95597-1\_2}, doi = {10.1007/978-3-319-95597-1\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/RocchettoFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RocchettoVV17, author = {Marco Rocchetto and Luca Vigan{\`{o}} and Marco Volpe}, title = {An interpolation-based method for the verification of security protocols}, journal = {J. Comput. Secur.}, volume = {25}, number = {6}, pages = {463--510}, year = {2017}, url = {https://doi.org/10.3233/JCS-16832}, doi = {10.3233/JCS-16832}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RocchettoVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RocchettoT17, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Towards Formal Security Analysis of Industrial Control Systems}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {114--126}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053024}, doi = {10.1145/3052973.3053024}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RocchettoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {On Attacker Models and Profiles for Cyber-Physical Systems}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {427--449}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_22}, doi = {10.1007/978-3-319-45741-3\_22}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eumas/SantacaCR016, author = {Katia Santac{\`{a}} and Matteo Cristani and Marco Rocchetto and Luca Vigan{\`{o}}}, editor = {Natalia Criado Pacheco and Carlos Carrascosa and Nardine Osman and Vicente Juli{\'{a}}n Inglada}, title = {A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems}, booktitle = {Multi-Agent Systems and Agreement Technologies - 14th European Conference, {EUMAS} 2016, and 4th International Conference, {AT} 2016, Valencia, Spain, December 15-16, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10207}, pages = {261--276}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59294-7\_21}, doi = {10.1007/978-3-319-59294-7\_21}, timestamp = {Thu, 08 Sep 2022 19:48:32 +0200}, biburl = {https://dblp.org/rec/conf/eumas/SantacaCR016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Kazuhiro Ogata and Mark Lawford and Shaoying Liu}, title = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions}, booktitle = {Formal Methods and Software Engineering - 18th International Conference on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10009}, pages = {175--192}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47846-3\_12}, doi = {10.1007/978-3-319-47846-3\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MeoR016, author = {Federico De Meo and Marco Rocchetto and Luca Vigan{\`{o}}}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL} Injection}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {179--195}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_13}, doi = {10.1007/978-3-319-46598-2\_13}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MeoR016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MeoRV16, author = {Federico De Meo and Marco Rocchetto and Luca Vigan{\`{o}}}, title = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL} Injection (Extended Version)}, journal = {CoRR}, volume = {abs/1605.00358}, year = {2016}, url = {http://arxiv.org/abs/1605.00358}, eprinttype = {arXiv}, eprint = {1605.00358}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MeoRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, title = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions}, journal = {CoRR}, volume = {abs/1607.02562}, year = {2016}, url = {http://arxiv.org/abs/1607.02562}, eprinttype = {arXiv}, eprint = {1607.02562}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RocchettoOD14, author = {Marco Rocchetto and Mart{\'{\i}}n Ochoa and Mohammad Torabi Dashti}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Model-Based Detection of {CSRF}}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {30--43}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_3}, doi = {10.1007/978-3-642-55415-5\_3}, timestamp = {Wed, 25 Sep 2019 18:08:09 +0200}, biburl = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RocchettoVVV13, author = {Marco Rocchetto and Luca Vigan{\`{o}} and Marco Volpe and Giacomo Dalle Vedove}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Using Interpolation for the Verification of Security Protocols}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {99--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_7}, doi = {10.1007/978-3-642-41098-7\_7}, timestamp = {Wed, 25 Sep 2019 18:14:27 +0200}, biburl = {https://dblp.org/rec/conf/stm/RocchettoVVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12, author = {Alessandro Armando and Wihem Arsac and Tigran Avanesov and Michele Barletta and Alberto Calvi and Alessandro Cappai and Roberto Carbone and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Gabriel Erzse and Simone Frau and Marius Minea and Sebastian M{\"{o}}dersheim and David von Oheimb and Giancarlo Pellegrino and Serena Elisa Ponta and Marco Rocchetto and Micha{\"{e}}l Rusinowitch and Mohammad Torabi Dashti and Mathieu Turuani and Luca Vigan{\`{o}}}, editor = {Cormac Flanagan and Barbara K{\"{o}}nig}, title = {The {AVANTSSAR} Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, {TACAS} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7214}, pages = {267--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28756-5\_19}, doi = {10.1007/978-3-642-28756-5\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.