Follow
Luca Durante
Luca Durante
Nationale Research Council of Italy
Verified email at ieiit.cnr.it - Homepage
Title
Cited by
Cited by
Year
Review of security issues in industrial networks
M Cheminod, L Durante, A Valenzano
IEEE transactions on industrial informatics 9 (1), 277-293, 2012
4452012
Spi2java: Automatic cryptographic protocol java code generation from spi calculus
D Pozza, R Sisto, L Durante
18th International Conference on Advanced Information Networking and …, 2004
832004
Automatic testing equivalence verification of spi calculus specifications
L Durante, R Sisto, A Valenzano
ACM Transactions on Software Engineering and Methodology (TOSEM) 12 (2), 222-284, 2003
832003
Performance evaluation and modeling of an industrial application-layer firewall
M Cheminod, L Durante, L Seno, A Valenzano
IEEE Transactions on Industrial Informatics 14 (5), 2159-2170, 2018
462018
Detecting chains of vulnerabilities in industrial networks
M Cheminod, IC Bertolotti, L Durante, P Maggi, D Pozza, R Sisto, ...
IEEE Transactions on Industrial Informatics 5 (2), 181-193, 2009
462009
Standard field bus networks for industrial applications
G Cena, L Durante, A Valenzano
Computer standards & interfaces 17 (2), 155-167, 1995
461995
Comparing lexical analysis tools for buffer overflow detection in network software
D Pozza, R Sisto, L Durante, A Valenzano
2006 1st International Conference on Communication Systems Software …, 2006
372006
A new CAN-like field network based on a star topology
G Cena, L Durante, A Valenzano
Computer Standards & Interfaces 23 (3), 209-222, 2001
332001
Leveraging SDN to improve security in industrial networks
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano, C Zunino
2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS …, 2017
292017
A comprehensive approach to the automatic refinement and verification of access control policies
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano
Computers & Security 80, 186-199, 2019
262019
Detection of attacks based on known vulnerabilities in industrial networked systems
M Cheminod, L Durante, L Seno, A Valenzano
journal of information security and applications 34, 153-165, 2017
252017
Semiautomated verification of access control implementation in industrial networked systems
M Cheminod, L Durante, L Seno, A Valenzano
IEEE Transactions on Industrial Informatics 11 (6), 1388-1399, 2015
252015
A state-exploration technique for spi-calculus testing-equivalence verification
L Durante, R Sisto, A Valenzano
International Conference on Protocol Specification, Testing and Verification …, 2000
252000
A model for the analysis of security policies in service function chains
L Durante, L Seno, F Valenza, A Valenzano
2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017
232017
A formal model and technique to redistribute the packet filtering load in multiple firewall networks
L Durante, L Seno, A Valenzano
IEEE Transactions on Information Forensics and Security 16, 2637-2651, 2021
172021
Tools for cryptographic protocols analysis: A technical and experimental comparison
M Cheminod, IC Bertolotti, L Durante, R Sisto, A Valenzano
Computer Standards & Interfaces 31 (5), 954-961, 2009
172009
Latency evaluation of a firewall for industrial networks based on the tofino industrial security solution
M Cereia, IC Bertolotti, L Durante, A Valenzano
Proceedings of the 2014 IEEE emerging technology and factory automation …, 2014
162014
On the description of access control policies in networked industrial systems
M Cheminod, L Durante, L Seno, A Valenzano
2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014
162014
Improving the security of industrial networks by means of formal verification
IC Bertolotti, L Durante, P Maggi, R Sisto, A Valenzano
Computer Standards & Interfaces 29 (3), 387-397, 2007
162007
Performance impact of commercial industrial firewalls on networked control systems
M Cheminod, L Durante, A Valenzano, C Zunino
2016 IEEE 21st international conference on emerging technologies and factory …, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20