A survey of autonomic communications S Dobson, S Denazis, A Fernández, D Gaïti, E Gelenbe, F Massacci, ... ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223-259, 2006 | 952 | 2006 |
Modeling security requirements through ownership, permission and delegation P Giorgini, F Massacci, J Mylopoulos, N Zannone 13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005 | 288 | 2005 |
Logical cryptanalysis as a SAT problem F Massacci, L Marraro Journal of Automated Reasoning 24, 165-203, 2000 | 248 | 2000 |
EXPTIME tableaux for ALC FM Donini, F Massacci Artificial Intelligence 124 (1), 87-138, 2000 | 213 | 2000 |
Comparing vulnerability severity and exploits using case-control studies L Allodi, F Massacci ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014 | 209 | 2014 |
Requirements engineering meets trust management: Model, methodology, and reasoning P Giorgini, F Massacci, J Mylopoulos, N Zannone Trust Management: Second International Conference, iTrust 2004, Oxford, UK …, 2004 | 146 | 2004 |
Strongly analytic tableaux for normal modal logics F Massacci International Conference on Automated Deduction, 723-737, 1994 | 143 | 1994 |
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 127 | 2015 |
Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation F Massacci, M Prest, N Zannone Computer Standards & Interfaces 27 (5), 445-455, 2005 | 126 | 2005 |
An access control framework for business processes for web services H Koshutanski, F Massacci Proceedings of the 2003 ACM workshop on XML security, 15-24, 2003 | 125 | 2003 |
Security events and vulnerability data for cybersecurity risk estimation L Allodi, F Massacci Risk Analysis 37 (8), 1606-1627, 2017 | 121 | 2017 |
Combining deduction and model checking into tableaux and algorithms for converse-PDL G De Giacomo, F Massacci Information and Computation 162 (1-2), 117-137, 2000 | 120 | 2000 |
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions H Mouratidis, P Giorgini Igi Global, 2006 | 117 | 2006 |
Requirements engineering for trust management: model, methodology, and reasoning P Giorgini, F Massacci, J Mylopoulos, N Zannone International Journal of Information Security 5, 257-274, 2006 | 116 | 2006 |
Single step tableaux for modal logics F Massacci Journal of Automated Reasoning 24, 319-364, 2000 | 114 | 2000 |
Vulnerable open source dependencies: Counting those that matter I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci Proceedings of the 12th ACM/IEEE international symposium on empirical …, 2018 | 111 | 2018 |
Verifying the SET registration protocols G Bella, F Massacci, LC Paulson IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003 | 111 | 2003 |
Security and trust requirements engineering P Giorgini, F Massacci, N Zannone International School on Foundations of Security Analysis and Design, 237-272, 2004 | 107 | 2004 |
Anatomy of exploit kits: Preliminary analysis of exploit kits as software artefacts V Kotov, F Massacci International symposium on engineering secure software and systems, 181-196, 2013 | 105 | 2013 |
Verifying security protocols as planning in logic programming L Carlucci Aiello, F Massacci ACM Transactions on Computational Logic (TOCL) 2 (4), 542-580, 2001 | 103 | 2001 |