Nome |
# |
On the impact of discreteness and abstractions on modelling noise in gene regulatory networks., file e0d6c926-eb62-fcf8-e053-d805fe0aa794
|
226
|
Securing IoT communications: at what cost?, file e0d6c927-6d03-fcf8-e053-d805fe0aa794
|
224
|
Language-Independent Synthesis of Firewall Policies, file e0d6c92e-b6b0-fcf8-e053-d805fe0aa794
|
177
|
Checking global usage of resources handled with local policies, file e0d6c928-0956-fcf8-e053-d805fe0aa794
|
174
|
Causal static analysis for Brane Calculi, file e0d6c926-ea35-fcf8-e053-d805fe0aa794
|
171
|
Context-aware security: Linguistic mechanisms and static analysis, file e0d6c927-afd7-fcf8-e053-d805fe0aa794
|
159
|
A static analysis for Brane Calculi providing global occurrence counting information, file e0d6c92c-f6dd-fcf8-e053-d805fe0aa794
|
151
|
Measuring security in IoT communications, file e0d6c92c-f6db-fcf8-e053-d805fe0aa794
|
148
|
Security Metrics at Work on the Things in IoT Systems, file e0d6c92e-70a2-fcf8-e053-d805fe0aa794
|
137
|
A Step Towards Checking Security in IoT, file e0d6c927-a5ba-fcf8-e053-d805fe0aa794
|
132
|
Revealing the trajectories of KLAIM tuples, statically, file e0d6c92d-b37d-fcf8-e053-d805fe0aa794
|
124
|
Experimenting with a Context-Aware Language, file e0d6c92d-0088-fcf8-e053-d805fe0aa794
|
118
|
A flat process calculus for nested membrane interactions, file e0d6c926-4606-fcf8-e053-d805fe0aa794
|
116
|
null, file e0d6c92c-f6e9-fcf8-e053-d805fe0aa794
|
110
|
Linguistic Mechanisms for Context-Aware Security, file e0d6c92d-3110-fcf8-e053-d805fe0aa794
|
110
|
A Quantitative Study of Two Attacks, file e0d6c927-6b5a-fcf8-e053-d805fe0aa794
|
108
|
Last Mile’s Resources, file e0d6c92c-e7fb-fcf8-e053-d805fe0aa794
|
108
|
A Global Occurrence Counting Analysis for Brane Calculi, file e0d6c92d-0082-fcf8-e053-d805fe0aa794
|
94
|
Where Do Your IoT Ingredients Come From?, file e0d6c927-b544-fcf8-e053-d805fe0aa794
|
89
|
Transcompiling Firewalls, file e0d6c92d-37a9-fcf8-e053-d805fe0aa794
|
85
|
A formal approach to open multiparty interactions, file e0d6c92c-480f-fcf8-e053-d805fe0aa794
|
81
|
Firewall Management With FireWall Synthesizer, file e0d6c92a-438d-fcf8-e053-d805fe0aa794
|
73
|
From Natural Projection to Partial Model Checking and Back, file e0d6c92d-32c5-fcf8-e053-d805fe0aa794
|
68
|
Tracking sensitive and untrustworthy data in IoT, file e0d6c928-b1a9-fcf8-e053-d805fe0aa794
|
63
|
Tool Supported Analysis of IoT, file e0d6c92c-eb85-fcf8-e053-d805fe0aa794
|
59
|
Here you can't: context-aware security., file e0d6c927-6cb7-fcf8-e053-d805fe0aa794
|
44
|
L'informatica nella didattica dell'informatica. La danza dei bit: dai fogli a quadretti al palcoscenico., file e0d6c927-6d04-fcf8-e053-d805fe0aa794
|
32
|
Programming in a context-aware language, file e0d6c930-8f4f-fcf8-e053-d805fe0aa794
|
31
|
The cost of securing IoT communications, file e0d6c928-751d-fcf8-e053-d805fe0aa794
|
30
|
Natural Projection as Partial Model Checking, file e0d6c92f-5b29-fcf8-e053-d805fe0aa794
|
25
|
Security in Pervasive Applications: A Survey, file e0d6c92d-1b6b-fcf8-e053-d805fe0aa794
|
21
|
null, file e0d6c929-4c18-fcf8-e053-d805fe0aa794
|
18
|
Tracing where IoT data are collected and aggregated, file e0d6c930-7016-fcf8-e053-d805fe0aa794
|
6
|
Context-aware security: Linguistic mechanisms and static analysis, file e0d6c927-a878-fcf8-e053-d805fe0aa794
|
5
|
Names of the Pi-Calculus Agents Handled Locally, file e0d6c926-1c26-fcf8-e053-d805fe0aa794
|
3
|
Formalising Security in Ubiquitous and Cloud Scenarios, file e0d6c926-390f-fcf8-e053-d805fe0aa794
|
3
|
The link-calculus for open multiparty interactions, file e0d6c92f-2cb1-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c931-790f-fcf8-e053-d805fe0aa794
|
3
|
Static Validation of Security Protocols, file e0d6c926-1a59-fcf8-e053-d805fe0aa794
|
2
|
An Analysis for Causal Properties of Membrane Interactions, file e0d6c926-37f6-fcf8-e053-d805fe0aa794
|
2
|
Where Do Your IoT Ingredients Come From?, file e0d6c927-a802-fcf8-e053-d805fe0aa794
|
2
|
Analysing the Provenance of IoT Data, file e0d6c92f-0ec9-fcf8-e053-d805fe0aa794
|
2
|
Authentication Primitives for Refining Protocol Specifications, file e0d6c926-1f8b-fcf8-e053-d805fe0aa794
|
1
|
An Enhanced CFA for Security Policies, file e0d6c926-22b1-fcf8-e053-d805fe0aa794
|
1
|
Constructing specific SOS semantics for concurrency via abstract interpretation, file e0d6c926-3256-fcf8-e053-d805fe0aa794
|
1
|
Open Multiparty Interaction, file e0d6c926-384d-fcf8-e053-d805fe0aa794
|
1
|
Revealing the trajectories of KLAIM tuples, statically, file e0d6c92d-a8aa-fcf8-e053-d805fe0aa794
|
1
|
Tracking data trajectories in IoT, file e0d6c92d-aa74-fcf8-e053-d805fe0aa794
|
1
|
A control flow analysis for safe and boxed ambients, file e0d6c92e-fc71-fcf8-e053-d805fe0aa794
|
1
|
Giornate Fibonacci: 850° anniversario della nascita di Leonardo Pisano, detto il Fibonacci, Pisa, Università di Pisa, 20-23 novem- bre 2020, file e0d6c931-6613-fcf8-e053-d805fe0aa794
|
1
|
Totale |
3.345 |