Folgen
Marco Rocchetto
Marco Rocchetto
V-Research
Bestätigte E-Mail-Adresse bei v-research.it - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1372012
On attacker models and profiles for cyber-physical systems
M Rocchetto, NO Tippenhauer
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1022016
CPDY: extending the Dolev-Yao attacker with physical-layer interactions
M Rocchetto, NO Tippenhauer
Formal Methods and Software Engineering: 18th International Conference on …, 2016
532016
Towards formal security analysis of industrial control systems
M Rocchetto, NO Tippenhauer
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
432017
Model-based detection of CSRF
M Rocchetto, M Ochoa, M Torabi Dashti
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
212014
Challenges and opportunities for model-based security risk assessment of cyber-physical systems
M Rocchetto, A Ferrari, V Senni
Resilience of Cyber-Physical Systems: From Risk Modelling to Threat …, 2019
132019
A topological categorization of agents for the definition of attack states in multi-agent systems
K Santacà, M Cristani, M Rocchetto, L Viganò
Multi-Agent Systems and Agreement Technologies: 14th European Conference …, 2017
72017
Formal analysis of vulnerabilities of web applications based on SQL injection
F De Meo, M Rocchetto, L Viganò
Security and Trust Management: 12th International Workshop, STM 2016 …, 2016
62016
An interpolation-based method for the verification of security protocols
M Rocchetto, L Viganò, M Volpe
Journal of Computer Security 25 (6), 463-510, 2017
42017
An interpolation-based method for the verification of security protocols
M Rocchetto, L Viganò, M Volpe
Journal of Computer Security 25 (6), 463-510, 2017
42017
Formal analysis of vulnerabilities of web applications based on SQL injection (extended version)
F De Meo, M Rocchetto, L Viganò
arXiv preprint arXiv:1605.00358, 2016
22016
Using interpolation for the verification of security protocols
M Rocchetto, L Vigano, M Volpe, GD Vedove
International Workshop on Security and Trust Management, 99-114, 2013
22013
Safety system based on hoistway access detection
G Gentile, D Martintoni, E Manes, L Manica, M Rocchetto, V Senni
US Patent App. 16/711,573, 2020
12020
Formal verification and risk assessment of an implementation of the OPC-UA Protocol
E Guerra, M Ceccato, M Rocchetto
2022
The Etiology of Cybersecurity
M Ambrosi, F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto
International Conference on Applied Cryptography and Network Security, 299-319, 2022
2022
Elevator car communication system
L Manica, T Rizano, M Rocchetto, D Martintoni, E Manes
US Patent App. 16/752,152, 2021
2021
The Etiology of Cybersecurity
F Beltramini, F De Meo, O Nardi, M Pacchin, M Rocchetto
https://www.researchgate.net/publication/354765715_The_Etiology_of_Cybersecurity, 2021
2021
Smart beamforming for reliable and secure wireless data transmissions
L Manica, E Manes, V Senni, M Rocchetto, D Martintoni, G Gentile, ...
US Patent App. 16/711,624, 2020
2020
Using Interpolation for the Verification of Security Protocols
G Dalle Vedove, M Rocchetto, L Vigano, M Volpe
FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings), 51, 2013
2013
Methods and tools for design time and runtime formal analysis of security protocols and web applications
M Rocchetto
University of Verona, 2011
2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20