关注
Riccardo Sisto
Riccardo Sisto
Professor of Computer Engineering, Politecnico di Torino
在 polito.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Distributed-memory model checking with SPIN
F Lerda, R Sisto
International SPIN Workshop on Model Checking of Software, 22-39, 1999
2531999
A deadlock detection tool for concurrent Java programs
C Demartini, R Iosif, R Sisto
Software: Practice and Experience 29 (7), 577-603, 1999
1821999
dSPIN: A dynamic extension of SPIN
C Demartini, R Iosif, R Sisto
Theoretical and Practical Aspects of SPIN Model Checking: 5th and 6th …, 1999
1511999
iNFAnt: NFA pattern matching on GPGPU devices
N Cascarano, P Rolando, F Risso, R Sisto
ACM SIGCOMM Computer Communication Review 40 (5), 20-26, 2010
1502010
Parallel CRC generation
G Albertengo, R Sisto
IEEE Micro 10 (5), 63-71, 1990
1501990
Using SPIN to verify security properties of cryptographic protocols
P Maggi, R Sisto
International SPIN Workshop on Model Checking of Software, 187-204, 2002
1402002
Formal verification of security protocol implementations: a survey
M Avalle, A Pironti, R Sisto
Formal Aspects of Computing 26, 99-123, 2014
982014
A LOTOS extension for the performance analysis of distributed systems
MA Marsan, A Bianco, L Ciminiera, R Sisto, A Valenzano
IEEE/ACM Transactions on Networking 2 (2), 151-165, 1994
861994
Automatic testing equivalence verification of spi calculus specifications
L Durante, R Sisto, A Valenzano
ACM Transactions on Software Engineering and Methodology (TOSEM) 12 (2), 222-284, 2003
832003
Spi2java: Automatic cryptographic protocol java code generation from spi calculus
D Pozza, R Sisto, L Durante
18th International Conference on Advanced Information Networking and …, 2004
802004
PIT overload analysis in content centric networks
M Virgilio, G Marchetto, R Sisto
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric …, 2013
682013
Formal vulnerability analysis of a security system for remote fieldbus access
M Cheminod, A Pironti, R Sisto
IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011
652011
Detecting chains of vulnerabilities in industrial networks
M Cheminod, IC Bertolotti, L Durante, P Maggi, D Pozza, R Sisto, ...
IEEE Transactions on Industrial Informatics 5 (2), 181-193, 2009
462009
The Java SPI framework for security protocol implementation
M Avalle, A Pironti, R Sisto, D Pozza
2011 Sixth International Conference on Availability, Reliability and …, 2011
432011
Automated optimal firewall orchestration and configuration in virtualized networks
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020
422020
A configurable mobile agent data protection protocol
P Maggi, R Sisto
Proceedings of the second international joint conference on Autonomous …, 2003
422003
Formal verification of virtual network function graphs in an sp-devops context
S Spinoso, M Virgilio, W John, A Manzalini, G Marchetto, R Sisto
Service Oriented and Cloud Computing: 4th European Conference, ESOCC 2015 …, 2015
412015
Modeling and validation of Java multi-threading applications using Spin
CG Demartini, R Iosif, R Sisto
Titolo volume non avvalorato, 5-19, 1998
411998
Securing SOME/IP for in-vehicle service protection
M Iorio, M Reineri, F Risso, R Sisto, F Valenza
IEEE Transactions on Vehicular Technology 69 (11), 13450-13466, 2020
392020
Towards a fully automated and optimized network security functions orchestration
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
2019 4th International Conference on Computing, Communications and Security …, 2019
382019
系统目前无法执行此操作,请稍后再试。
文章 1–20