Luca Durante
Orcid: 0000-0001-9319-7620
According to our database1,
Luca Durante
authored at least 46 papers
between 1994 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Improving performance and cyber-attack resilience in multi-firewall industrial networks.
Proceedings of the 18th IEEE International Conference on Factory Communication Systems, 2022
Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior<sup>*</sup>.
Proceedings of the IECON 2022, 2022
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022
2021
A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the Italian Conference on Cybersecurity, 2021
2019
A comprehensive approach to the automatic refinement and verification of access control policies.
Comput. Secur., 2019
2018
IEEE Trans. Ind. Informatics, 2018
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018
2017
J. Inf. Secur. Appl., 2017
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017
2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016
2015
Semiautomated Verification of Access Control Implementation in Industrial Networked Systems.
IEEE Trans. Ind. Informatics, 2015
A twofold model for the analysis of access control policies in industrial networked systems.
Comput. Stand. Interfaces, 2015
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015
A semi-graphical modeling framework for the automated analysis of networked systems security.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015
Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
2014
Proceedings of the 10th IEEE Workshop on Factory Communication Systems, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014
2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
2012
Proceedings of the 7th IEEE International Symposium on Industrial Embedded Systems, 2012
Proceedings of the Critical Information Infrastructures Security, 2012
2009
IEEE Trans. Ind. Informatics, 2009
Comput. Stand. Interfaces, 2009
2008
Efficient representation of the attacker's knowledge in cryptographic protocols analysis.
Formal Aspects Comput., 2008
2007
Comput. Stand. Interfaces, 2007
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007
2006
Int. J. Found. Comput. Sci., 2006
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
2005
Proceedings of the Detection of Intrusions and Malware, 2005
2004
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
ACM Trans. Softw. Eng. Methodol., 2003
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003
2001
Comput. Stand. Interfaces, 2001
2000
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification.
Proceedings of the Formal Techniques for Distributed System Development, 2000
1997
1994
Softw. Eng. J., 1994
A LOTOS specification of the SERCOS field-bus protocol.
Proceedings of the SEKE'94, 1994