A Survey on Intrusion Detection Systems for Fog and Cloud Computing V Chang, L Golightly, P Modesti, QA Xu, LMT Doan, K Hall, S Boddu, ... Future Internet 14 (3), 27, 2022 | 57 | 2022 |
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN L Golightly, P Modesti, R Garcia, V Chang Cyber Security and Applications 1, 100015, 2023 | 28 | 2023 |
Typing and compositionality for security protocols: a generalization to the geometric fragment O Almousa, S Mödersheim, P Modesti, L Viganò European Symposium on Research in Computer Security, 209-229, 2015 | 28 | 2015 |
Security protocol specification and verification with AnBx M Bugliesi, S Calzavara, S Mödersheim, P Modesti Journal of Information Security and Applications 30, 46-63, 2016 | 22 | 2016 |
AnBx: Automatic generation and verification of security protocols implementations P Modesti International Symposium on Foundations and Practice of Security, 156-173, 2015 | 20 | 2015 |
Efficient Java code generation of security protocols specified in AnB/AnBx P Modesti International Workshop on Security and Trust Management, 204-208, 2014 | 16 | 2014 |
AnBx-Security Protocols Design and Verification M Bugliesi, P Modesti Joint Workshop on Automated Reasoning for Security Protocol Analysis and …, 2010 | 16 | 2010 |
Verifying Sevecom using set-based abstraction S Mödersheim, P Modesti Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th …, 2011 | 12 | 2011 |
Formal modelling and security analysis of Bitcoin’s payment protocol P Modesti, SF Shahandashti, P McCorry, F Hao Computers & Security 107, 102279, 2021 | 9 | 2021 |
Security analysis of the open banking account and transaction API protocol A Almehrej, L Freitas, P Modesti arXiv preprint arXiv:2003.12776, 2020 | 9 | 2020 |
An IDE for the Design, Verification and Implementation of Security Protocols R Garcia, P Modesti IEEE International Symposium on Software Reliability Engineering Workshops …, 2017 | 9 | 2017 |
Verified security protocol modeling and implementation with AnBx P Modesti Università Ca' Foscari Venezia, 2012 | 7 | 2012 |
A script-based approach for teaching and assessing Android application development P Modesti ACM Transactions on Computing Education (TOCE) 21 (1), 1-24, 2021 | 6 | 2021 |
Account and Transaction Protocol of the Open Banking Standard A Almehrej, L Freitas, P Modesti Rigorous State-Based Methods: 7th International Conference, ABZ 2020, Ulm …, 2020 | 5 | 2020 |
A Methodology for Protocol Verification Applied to EMV® 1 L Freitas, P Modesti, M Emms Brazilian Symposium on Formal Methods, 180-197, 2018 | 5 | 2018 |
Integrating Formal Methods for Security in Software Security Education P Modesti Informatics in Education 19 (3), 425-454, 2020 | 4 | 2020 |
Efficient Java code generation of security protocols specified in AnB P Modesti Newcastle University Technical Report, 2014 | 4 | 2014 |
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator L Golightly, P Modesti, V Chang Journal of Cybersecurity and Privacy 3 (3), 464-492, 2023 | 3 | 2023 |
Formal Modeling and Security Analysis of Security Protocols P Modesti, R Garcia Handbook of Formal Analysis and Verification in Cryptography, 213–274, 2023 | 2 | 2023 |
Typing and compositionality for security protocols: a generalization to the geometric fragment (extended version) O Almousa, SA Mödersheim, P Modesti, L Viganò Technical University of Denmark, 2015 | 2* | 2015 |