Distributed-memory model checking with SPIN F Lerda, R Sisto International SPIN Workshop on Model Checking of Software, 22-39, 1999 | 253 | 1999 |
A deadlock detection tool for concurrent Java programs C Demartini, R Iosif, R Sisto Software: Practice and Experience 29 (7), 577-603, 1999 | 182 | 1999 |
dSPIN: A dynamic extension of SPIN C Demartini, R Iosif, R Sisto Theoretical and Practical Aspects of SPIN Model Checking: 5th and 6th …, 1999 | 151 | 1999 |
iNFAnt: NFA pattern matching on GPGPU devices N Cascarano, P Rolando, F Risso, R Sisto ACM SIGCOMM Computer Communication Review 40 (5), 20-26, 2010 | 150 | 2010 |
Parallel CRC generation G Albertengo, R Sisto IEEE Micro 10 (5), 63-71, 1990 | 150 | 1990 |
Using SPIN to verify security properties of cryptographic protocols P Maggi, R Sisto International SPIN Workshop on Model Checking of Software, 187-204, 2002 | 140 | 2002 |
Formal verification of security protocol implementations: a survey M Avalle, A Pironti, R Sisto Formal Aspects of Computing 26, 99-123, 2014 | 98 | 2014 |
A LOTOS extension for the performance analysis of distributed systems MA Marsan, A Bianco, L Ciminiera, R Sisto, A Valenzano IEEE/ACM Transactions on Networking 2 (2), 151-165, 1994 | 86 | 1994 |
Automatic testing equivalence verification of spi calculus specifications L Durante, R Sisto, A Valenzano ACM Transactions on Software Engineering and Methodology (TOSEM) 12 (2), 222-284, 2003 | 83 | 2003 |
Spi2java: Automatic cryptographic protocol java code generation from spi calculus D Pozza, R Sisto, L Durante 18th International Conference on Advanced Information Networking and …, 2004 | 80 | 2004 |
PIT overload analysis in content centric networks M Virgilio, G Marchetto, R Sisto Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric …, 2013 | 68 | 2013 |
Formal vulnerability analysis of a security system for remote fieldbus access M Cheminod, A Pironti, R Sisto IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011 | 65 | 2011 |
Detecting chains of vulnerabilities in industrial networks M Cheminod, IC Bertolotti, L Durante, P Maggi, D Pozza, R Sisto, ... IEEE Transactions on Industrial Informatics 5 (2), 181-193, 2009 | 46 | 2009 |
The Java SPI framework for security protocol implementation M Avalle, A Pironti, R Sisto, D Pozza 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 43 | 2011 |
Automated optimal firewall orchestration and configuration in virtualized networks D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020 | 42 | 2020 |
A configurable mobile agent data protection protocol P Maggi, R Sisto Proceedings of the second international joint conference on Autonomous …, 2003 | 42 | 2003 |
Formal verification of virtual network function graphs in an sp-devops context S Spinoso, M Virgilio, W John, A Manzalini, G Marchetto, R Sisto Service Oriented and Cloud Computing: 4th European Conference, ESOCC 2015 …, 2015 | 41 | 2015 |
Modeling and validation of Java multi-threading applications using Spin CG Demartini, R Iosif, R Sisto Titolo volume non avvalorato, 5-19, 1998 | 41 | 1998 |
Securing SOME/IP for in-vehicle service protection M Iorio, M Reineri, F Risso, R Sisto, F Valenza IEEE Transactions on Vehicular Technology 69 (11), 13450-13466, 2020 | 39 | 2020 |
Towards a fully automated and optimized network security functions orchestration D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov 2019 4th International Conference on Computing, Communications and Security …, 2019 | 38 | 2019 |