Process mining manifesto W Van Der Aalst, A Adriansyah, AKA De Medeiros, F Arcieri, T Baier, ... Business Process Management Workshops: BPM 2011 International Workshops …, 2012 | 1913 | 2012 |
Automated generation of attack trees R Vigo, F Nielson, HR Nielson 2014 IEEE 27th computer security foundations symposium, 337-350, 2014 | 94 | 2014 |
A calculus for attribute-based communication YA Alrahman, R De Nicola, M Loreti, F Tiezzi, R Vigo Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1840-1845, 2015 | 56 | 2015 |
A calculus for quality HR Nielson, F Nielson, R Vigo Formal Aspects of Component Software: 9th International Symposium, FACS 2012 …, 2013 | 49 | 2013 |
Broadcast, denial-of-service, and secure communication R Vigo, F Nielson, HR Nielson Integrated Formal Methods: 10th International Conference, IFM 2013, Turku …, 2013 | 40 | 2013 |
A framework for semi-automated process instance discovery from decorative attributes A Burattin, R Vigo 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM …, 2011 | 25 | 2011 |
Smart grid security a smart meter-centric perspective R Vigo, E Yuksel, C Ramli Telecommunications Forum (TELFOR), 2012 20th, 127-130, 2012 | 24 | 2012 |
The cyber-physical attacker R Vigo Computer Safety, Reliability, and Security: SAFECOMP 2012 Workshops: Sassur …, 2012 | 24 | 2012 |
Security games for cyber-physical systems R Vigo, A Bruni, E Yüksel Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013 | 16 | 2013 |
Availability by Design-A Complementary Approach to Denial-of-Service R Vigo, HR Nielson, F Nielson Technical University of Denmark, Danmarks Tekniske Universitet, Department …, 2015 | 8 | 2015 |
A calculus of quality for robustness against unreliable communication HR Nielson, F Nielson, R Vigo Journal of Logical and Algebraic Methods in Programming 84 (5), 611-639, 2015 | 7 | 2015 |
Uniform protection for multi-exposed targets R Vigo, F Nielson, HR Nielson Formal Techniques for Distributed Objects, Components, and Systems: 34th …, 2014 | 7 | 2014 |
Toward a threat model for energy-harvesting wireless sensor networks A Di Mauro, D Papini, R Vigo, N Dragoni Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012 | 7 | 2012 |
Discovering, quantifying, and displaying attacks R Vigo, F Nielson, HR Nielson Logical Methods in Computer Science 12, 2017 | 4 | 2017 |
Trust-Based Enforcement of Security Policies R Vigo, A Celestini, F Tiezzi, R De Nicola, F Nielson, HR Nielson Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome …, 2014 | 2 | 2014 |
Introducing the Cyber-Physical Attacker to Energy-Harvesting Wireless Sensor Networks A Di Mauro, D Papini, R Vigo, N Dragoni Journal of Networking Technology Volume 3 (3), 139, 2012 | 2 | 2012 |
Availability by Design R Vigo, F Nielson, HR Nielson Secure IT Systems 8788, 277-278, 2014 | 1 | 2014 |
Expressive power of definite clauses for verifying authenticity G Filé, R Vigo 2009 22nd IEEE Computer Security Foundations Symposium, 251-265, 2009 | 1 | 2009 |
A calculus of quality for robustness against unreliable communication-DTU Orbit (11/01/2016) HR Nielson, F Nielson, R Vigo | | 2015 |