BibTeX records: Marco Rocchetto

download as .bib file

@inproceedings{DBLP:conf/acns/AmbrosiBMNPR22,
  author       = {Michele Ambrosi and
                  Francesco Beltramini and
                  Federico De Meo and
                  Oliviero Nardi and
                  Mattia Pacchin and
                  Marco Rocchetto},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {The Etiology of Cybersecurity},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_17},
  doi          = {10.1007/978-3-031-16815-4\_17},
  timestamp    = {Tue, 27 Sep 2022 16:52:52 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AmbrosiBMNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/RocchettoFS19,
  author       = {Marco Rocchetto and
                  Alberto Ferrari and
                  Valerio Senni},
  editor       = {Francesco Flammini},
  title        = {Challenges and Opportunities for Model-Based Security Risk Assessment
                  of Cyber-Physical Systems},
  booktitle    = {Resilience of Cyber-Physical Systems, From Risk Modelling to Threat
                  Counteraction},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-95597-1\_2},
  doi          = {10.1007/978-3-319-95597-1\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/RocchettoFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RocchettoVV17,
  author       = {Marco Rocchetto and
                  Luca Vigan{\`{o}} and
                  Marco Volpe},
  title        = {An interpolation-based method for the verification of security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {6},
  pages        = {463--510},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-16832},
  doi          = {10.3233/JCS-16832},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RocchettoVV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RocchettoT17,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Towards Formal Security Analysis of Industrial Control Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {114--126},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053024},
  doi          = {10.1145/3052973.3053024},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RocchettoT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {On Attacker Models and Profiles for Cyber-Physical Systems},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_22},
  doi          = {10.1007/978-3-319-45741-3\_22},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eumas/SantacaCR016,
  author       = {Katia Santac{\`{a}} and
                  Matteo Cristani and
                  Marco Rocchetto and
                  Luca Vigan{\`{o}}},
  editor       = {Natalia Criado Pacheco and
                  Carlos Carrascosa and
                  Nardine Osman and
                  Vicente Juli{\'{a}}n Inglada},
  title        = {A Topological Categorization of Agents for the Definition of Attack
                  States in Multi-agent Systems},
  booktitle    = {Multi-Agent Systems and Agreement Technologies - 14th European Conference,
                  {EUMAS} 2016, and 4th International Conference, {AT} 2016, Valencia,
                  Spain, December 15-16, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10207},
  pages        = {261--276},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59294-7\_21},
  doi          = {10.1007/978-3-319-59294-7\_21},
  timestamp    = {Thu, 08 Sep 2022 19:48:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eumas/SantacaCR016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Kazuhiro Ogata and
                  Mark Lawford and
                  Shaoying Liu},
  title        = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions},
  booktitle    = {Formal Methods and Software Engineering - 18th International Conference
                  on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November
                  14-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10009},
  pages        = {175--192},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47846-3\_12},
  doi          = {10.1007/978-3-319-47846-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MeoR016,
  author       = {Federico De Meo and
                  Marco Rocchetto and
                  Luca Vigan{\`{o}}},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL}
                  Injection},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_13},
  doi          = {10.1007/978-3-319-46598-2\_13},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MeoR016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MeoRV16,
  author       = {Federico De Meo and
                  Marco Rocchetto and
                  Luca Vigan{\`{o}}},
  title        = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL}
                  Injection (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1605.00358},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.00358},
  eprinttype    = {arXiv},
  eprint       = {1605.00358},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MeoRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  title        = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions},
  journal      = {CoRR},
  volume       = {abs/1607.02562},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.02562},
  eprinttype    = {arXiv},
  eprint       = {1607.02562},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RocchettoOD14,
  author       = {Marco Rocchetto and
                  Mart{\'{\i}}n Ochoa and
                  Mohammad Torabi Dashti},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Model-Based Detection of {CSRF}},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_3},
  doi          = {10.1007/978-3-642-55415-5\_3},
  timestamp    = {Wed, 25 Sep 2019 18:08:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RocchettoVVV13,
  author       = {Marco Rocchetto and
                  Luca Vigan{\`{o}} and
                  Marco Volpe and
                  Giacomo Dalle Vedove},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Using Interpolation for the Verification of Security Protocols},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_7},
  doi          = {10.1007/978-3-642-41098-7\_7},
  timestamp    = {Wed, 25 Sep 2019 18:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RocchettoVVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12,
  author       = {Alessandro Armando and
                  Wihem Arsac and
                  Tigran Avanesov and
                  Michele Barletta and
                  Alberto Calvi and
                  Alessandro Cappai and
                  Roberto Carbone and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Gabriel Erzse and
                  Simone Frau and
                  Marius Minea and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Giancarlo Pellegrino and
                  Serena Elisa Ponta and
                  Marco Rocchetto and
                  Micha{\"{e}}l Rusinowitch and
                  Mohammad Torabi Dashti and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}}},
  editor       = {Cormac Flanagan and
                  Barbara K{\"{o}}nig},
  title        = {The {AVANTSSAR} Platform for the Automated Validation of Trust and
                  Security of Service-Oriented Architectures},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 18th International Conference, {TACAS} 2012, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7214},
  pages        = {267--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28756-5\_19},
  doi          = {10.1007/978-3-642-28756-5\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics