Review of security issues in industrial networks M Cheminod, L Durante, A Valenzano IEEE transactions on industrial informatics 9 (1), 277-293, 2012 | 445 | 2012 |
Spi2java: Automatic cryptographic protocol java code generation from spi calculus D Pozza, R Sisto, L Durante 18th International Conference on Advanced Information Networking and …, 2004 | 83 | 2004 |
Automatic testing equivalence verification of spi calculus specifications L Durante, R Sisto, A Valenzano ACM Transactions on Software Engineering and Methodology (TOSEM) 12 (2), 222-284, 2003 | 83 | 2003 |
Performance evaluation and modeling of an industrial application-layer firewall M Cheminod, L Durante, L Seno, A Valenzano IEEE Transactions on Industrial Informatics 14 (5), 2159-2170, 2018 | 46 | 2018 |
Detecting chains of vulnerabilities in industrial networks M Cheminod, IC Bertolotti, L Durante, P Maggi, D Pozza, R Sisto, ... IEEE Transactions on Industrial Informatics 5 (2), 181-193, 2009 | 46 | 2009 |
Standard field bus networks for industrial applications G Cena, L Durante, A Valenzano Computer standards & interfaces 17 (2), 155-167, 1995 | 46 | 1995 |
Comparing lexical analysis tools for buffer overflow detection in network software D Pozza, R Sisto, L Durante, A Valenzano 2006 1st International Conference on Communication Systems Software …, 2006 | 37 | 2006 |
A new CAN-like field network based on a star topology G Cena, L Durante, A Valenzano Computer Standards & Interfaces 23 (3), 209-222, 2001 | 33 | 2001 |
Leveraging SDN to improve security in industrial networks M Cheminod, L Durante, L Seno, F Valenza, A Valenzano, C Zunino 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS …, 2017 | 29 | 2017 |
A comprehensive approach to the automatic refinement and verification of access control policies M Cheminod, L Durante, L Seno, F Valenza, A Valenzano Computers & Security 80, 186-199, 2019 | 26 | 2019 |
Detection of attacks based on known vulnerabilities in industrial networked systems M Cheminod, L Durante, L Seno, A Valenzano journal of information security and applications 34, 153-165, 2017 | 25 | 2017 |
Semiautomated verification of access control implementation in industrial networked systems M Cheminod, L Durante, L Seno, A Valenzano IEEE Transactions on Industrial Informatics 11 (6), 1388-1399, 2015 | 25 | 2015 |
A state-exploration technique for spi-calculus testing-equivalence verification L Durante, R Sisto, A Valenzano International Conference on Protocol Specification, Testing and Verification …, 2000 | 25 | 2000 |
A model for the analysis of security policies in service function chains L Durante, L Seno, F Valenza, A Valenzano 2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017 | 23 | 2017 |
A formal model and technique to redistribute the packet filtering load in multiple firewall networks L Durante, L Seno, A Valenzano IEEE Transactions on Information Forensics and Security 16, 2637-2651, 2021 | 17 | 2021 |
Tools for cryptographic protocols analysis: A technical and experimental comparison M Cheminod, IC Bertolotti, L Durante, R Sisto, A Valenzano Computer Standards & Interfaces 31 (5), 954-961, 2009 | 17 | 2009 |
Latency evaluation of a firewall for industrial networks based on the tofino industrial security solution M Cereia, IC Bertolotti, L Durante, A Valenzano Proceedings of the 2014 IEEE emerging technology and factory automation …, 2014 | 16 | 2014 |
On the description of access control policies in networked industrial systems M Cheminod, L Durante, L Seno, A Valenzano 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014 | 16 | 2014 |
Improving the security of industrial networks by means of formal verification IC Bertolotti, L Durante, P Maggi, R Sisto, A Valenzano Computer Standards & Interfaces 29 (3), 387-397, 2007 | 16 | 2007 |
Performance impact of commercial industrial firewalls on networked control systems M Cheminod, L Durante, A Valenzano, C Zunino 2016 IEEE 21st international conference on emerging technologies and factory …, 2016 | 15 | 2016 |