Full abstraction for PCF S Abramsky, R Jagadeesan, P Malacaria Information and computation 163 (2), 409-470, 2000 | 667 | 2000 |
Decision support approaches for cyber security investment A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi Decision support systems 86, 13-23, 2016 | 333 | 2016 |
A static analysis for quantifying information flow in a simple imperative language D Clark, S Hunt, P Malacaria Journal of Computer Security 15 (3), 321-371, 2007 | 248 | 2007 |
Full abstraction for PCF S Abramsky, P Malacaria, R Jagadeesan Theoretical Aspects of Computer Software: International Symposium TACS'94 …, 1994 | 243 | 1994 |
Quantitative analysis of the leakage of confidential data D Clark, S Hunt, P Malacaria Electronic Notes in Theoretical Computer Science 59 (3), 238-251, 2002 | 230 | 2002 |
Assessing security threats of looping constructs P Malacaria Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2007 | 218 | 2007 |
Quantitative information flow, relations and polymorphic types D Clark, S Hunt, P Malacaria Journal of Logic and Computation 15 (2), 181-199, 2005 | 182 | 2005 |
Quantifying information leaks in software J Heusser, P Malacaria Proceedings of the 26th annual computer security applications conference …, 2010 | 147 | 2010 |
Multi-run side-channel analysis using Symbolic Execution and Max-SMT CS Pasareanu, QS Phan, P Malacaria 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 387-400, 2016 | 116 | 2016 |
Quantified interference for a while language D Clark, S Hunt, P Malacaria Electronic Notes in Theoretical Computer Science 112, 149-166, 2005 | 114 | 2005 |
Lagrange multipliers and maximum information leakage in different observational models P Malacaria, H Chen Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008 | 93 | 2008 |
Game theory meets information security management A Fielder, E Panaousis, P Malacaria, C Hankin, F Smeraldi ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 89 | 2014 |
Synthesis of adaptive side-channel attacks QS Phan, L Bang, CS Pasareanu, P Malacaria, T Bultan 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 328-342, 2017 | 83 | 2017 |
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs MHR Khouzani, Z Liu, P Malacaria European Journal of Operational Research 278 (3), 894-903, 2019 | 81 | 2019 |
Symbolic quantitative information flow QS Phan, P Malacaria, O Tkachuk, CS Păsăreanu ACM SIGSOFT Software Engineering Notes 37 (6), 1-5, 2012 | 70 | 2012 |
Quantifying information leaks using reliability analysis QS Phan, P Malacaria, CS Păsăreanu, M d'Amorim Proceedings of the 2014 International SPIN Symposium on Model Checking of …, 2014 | 60 | 2014 |
Cybersecurity games and investments: A decision support approach E Panaousis, A Fielder, P Malacaria, C Hankin, F Smeraldi Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 58 | 2014 |
Abstract model counting: a novel approach for quantification of information leaks QS Phan, P Malacaria Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 55 | 2014 |
Non-deterministic games and program analysis: An application to security P Malacaria, C Hankin Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158 …, 1999 | 47 | 1999 |
Quantitative analysis of leakage for multi-threaded programs H Chen, P Malacaria Proceedings of the 2007 workshop on Programming languages and analysis for …, 2007 | 46 | 2007 |