Luca Viganò
Orcid: 0000-0001-9916-271XAffiliations:
- King's College London, UK
According to our database1,
Luca Viganò
authored at least 162 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
APOLLO: A GPT-based tool to detect phishing emails and generate explanations that warn users.
CoRR, 2024
A Formal Approach For Modelling And Analysing Surgical Procedures (Extended Version).
CoRR, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Supporting the Design of Phishing Education, Training and Awareness interventions: an LLM-based approach.
Proceedings of the 2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024) co-located with the 17th International Conference on Advanced Visual Interfaces (AVI 2024), 2024
2023
A mutation-based approach for the formal and automated analysis of security ceremonies.
J. Comput. Secur., 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Cybersecurity, Nicolas Cage and Peppa Pig.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
J. Comput. Secur., 2022
Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell).
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Formal Methods for Socio-technical Security - (Formal and Automated Analysis of Security Ceremonies).
Proceedings of the Coordination Models and Languages, 2022
2021
J. Data Semant., 2021
Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way.
Inf. Comput., 2021
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021
2020
ACM Trans. Priv. Secur., 2020
ACM Trans. Priv. Secur., 2020
A formal and automated approach to exploiting multi-stage attacks of web applications.
J. Comput. Secur., 2020
Proceedings of the Socio-Technical Aspects in Security and Trust, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Theor. Comput. Sci., 2019
Last man standing: Static, decremental and dynamic resiliency via controller synthesis.
J. Comput. Secur., 2019
J. Artif. Intell. Res., 2019
A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Extended Version).
CoRR, 2019
It could be worse, it could be raining: reliable automatic meteorological forecasting.
CoRR, 2019
J. Comput. Inf. Technol., 2019
Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions.
Proceedings of the 26th International Symposium on Temporal Representation and Reasoning, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Business Process Management Workshops, 2019
2018
Softw. Test. Verification Reliab., 2018
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies.
J. Comput. Secur., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
Proceedings of the Agents and Artificial Intelligence - 10th International Conference, 2018
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018
Proceedings of the Computer Security, 2018
2017
J. Comput. Secur., 2017
A branching distributed temporal logic for reasoning about entanglement-free quantum state transformations.
Inf. Comput., 2017
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version).
CoRR, 2017
Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2017
A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty.
Proceedings of the Business Process Management - 15th International Conference, 2017
2016
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version).
CoRR, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
An automated approach for testing the security of web applications against chained attacks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems.
Proceedings of the Multi-Agent Systems and Agreement Technologies, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
J. Comput. Secur., 2015
Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios.
Frontiers ICT, 2015
Security Constraints in Temporal Role-Based Access-Controlled Workflows (Extended Version).
CoRR, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Automated analysis of RBAC policies with temporal constraints and static role hierarchies.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
2014
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.
Theor. Comput. Sci., 2014
Quantum State Transformations and Branching Distributed Temporal Logic - (Invited Paper).
Proceedings of the Logic, Language, Information, and Computation, 2014
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
On the Mosaic Method for Many-Dimensional Modal Logics: A Case Study Combining Tense and Modal Operators.
Logica Universalis, 2013
Proceedings of the 2013 20th International Symposium on Temporal Representation and Reasoning, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version).
CoRR, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Automated validation of trust and security of service-oriented architectures with the AVANTSSAR platform.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Theor. Comput. Sci., 2011
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures.
Serv. Oriented Comput. Appl., 2011
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services.
Scalable Comput. Pract. Exp., 2011
J. Multiple Valued Log. Soft Comput., 2011
J. Log. Comput., 2011
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
CoRR, 2011
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Blocking Underhand Attacks by Hidden Coalitions.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011
Proceedings of the Future Internet, 2011
A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes.
Proceedings of the CRiSIS 2011, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
J. Comput. Secur., 2010
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version)
CoRR, 2010
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010
Proceedings of the Declarative Agent Languages and Technologies VIII, 2010
2009
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
CoRR, 2009
Proceedings of the Logical Foundations of Computer Science, International Symposium, 2009
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols.
Proceedings of the Foundations of Security Analysis and Design V, 2009
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput., 2008
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008
Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008), 2008
2006
Theor. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
2005
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
Log. J. IGPL, 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
2004
Modal Sequent Calculi Labelled with Truth Values: Completeness, Duality and Analyticity.
Log. J. IGPL, 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Logic for Programming, 2004
2003
J. Appl. Non Class. Logics, 2003
Proceedings of the Computer Security, 2003
CDiff: a new reduction technique for constraint-based analysis of security protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002
Proceedings of the Frontiers of Combining Systems, 4th International Workshop, 2002
Proceedings of the Computer Aided Verification, 14th International Conference, 2002
2001
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, 2001
2000
Labelled non-classical logics.
Kluwer, ISBN: 978-0-7923-7749-8, 2000
1998
A Recipe for the Complexity Analysis of Non-Classical Logics.
Proceedings of the Frontiers of Combining Systems, Second International Workshop, 1998
1997
Proceedings of the KI-97: Advances in Artificial Intelligence, 1997
Proceedings of the Computational Logic and Proof Theory, 5th Kurt Gödel Colloquium, 1997
1996
Implementing Modal and Relevance Logics in a Logical Framework.
Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR'96), 1996
A Topography of Labelled Modal Logics.
Proceedings of the Frontiers of Combining Systems, 1996
1993
Proceedings of the Advances in Artificial Intelligence, 1993
1992
Proceedings of the ALPUK92, Proceedings of the 4th UK Conference on Logic Programming, London, 30 March, 1992