2024
CNN Architectures for Vehicle Detection in V2X Environments: A Comparative Study.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2024
Robustness Analysis of Probabilistic Models with Adversaries or Strategic Entities.
Proceedings of the Principles of Verification: Cycling the Probabilistic Landscape, 2024
2023
SMT-Based Stability Verification of an Industrial Switched PI Control Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2021
The VALU3S ECSEL project: Verification and validation of automated systems safety and security.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Microprocess. Microsystems, November, 2021
Learning Moore machines from input-output traces.
Int. J. Softw. Tools Technol. Transf., 2021
2020
ReForm: A Tool for Rapid Requirements Formalization.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
Second Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2020 Workshop (InterAVT 2020).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
Efficient Translation of Safety LTL to DFA Using Symbolic Automata Learning and Inductive Inference.
Proceedings of the Computer Safety, Reliability, and Security, 2020
Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020
The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
2019
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2019
Formal Verification of Network Interlocking Control by Distributed Signal Boxes.
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019
2018
Formal Methods for Energy-Efficient EPONs.
IEEE Trans. Green Commun. Netw., 2018
Lessons Learned Using FMI Co-simulation for Model-Based Design of Cyber Physical Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, 2018
2017
Injecting Formal Verification in FMI-Based Co-simulations of Cyber-Physical Systems.
Proceedings of the Software Engineering and Formal Methods, 2017
Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design Approach.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs.
Proceedings of the IEEE International Conference on Communications, 2017
2016
Formal security analysis of near field communication using model checking.
Comput. Secur., 2016
Integrated tool chain for model-based design of Cyber-Physical Systems: The INTO-CPS project.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2016 2nd International Workshop on Modelling, 2016
2015
Towards Verification of Multicore Motor-Drive Controllers in Aerospace.
Proceedings of the Computer Safety, Reliability, and Security, 2015
2014
Security analysis of NFC relay attacks using probabilistic model checking.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
2013
Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks.
IEEE Syst. J., 2013
Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013
2012
Formal analysis for robust anti-SPIT protection using model checking.
Int. J. Inf. Sec., 2012
Towards energy consumption evaluation of the SSL handshake protocol in mobile communications.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012
2011
Synthesis of attack actions using model checking for the verification of security protocols.
Secur. Commun. Networks, 2011
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach.
Comput. Secur., 2011
Quantitative analysis for authentication of low-cost RFID tags.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Quantitative model checking of an RSA-based email protocol on mobile devices.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011
2010
An intruder model with message inspection for model checking security protocols.
Comput. Secur., 2010
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010
A Formally Verified Mechanism for Countering SPIT.
Proceedings of the Critical Information Infrastructures Security, 2010
2009
Ανάπτυξη τυπικών μεθόδων για τον έλεγχο πρωτοκόλλων ασφαλείας
PhD thesis, 2009
State Space Reduction with Message Inspection in Security Protocol Model Checking
CoRR, 2009
Attacking an OT-Based Blind Signature Scheme
CoRR, 2009
Probabilistic model checking for the quantification of DoS security threats.
Comput. Secur., 2009
2008
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees.
Proceedings of the Computer Safety, 2007
2006
Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker.
Proceedings of the Parallel and Distributed Processing and Applications, 2006