Pasquale Malacaria
Orcid: 0000-0001-6155-1541
According to our database1,
Pasquale Malacaria
authored at least 77 papers
between 1991 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization.
Entropy, 2022
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool.
CoRR, 2022
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases.
Comput. Secur., 2022
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
2021
Decis. Support Syst., 2021
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity.
IEEE Trans. Inf. Theory, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints.
IEEE Trans. Inf. Theory, 2019
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs.
Eur. J. Oper. Res., 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints.
CoRR, 2018
Proceedings of the ECML PKDD 2018 Workshops, 2018
2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
Decis. Support Syst., 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Math. Struct. Comput. Sci., 2015
Proceedings of the IEEE International Conference on Communication, 2015
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 2014 International Symposium on Model Checking of Software, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
SideAuto: quantitative information flow for side-channel leakage in web applications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky, 2013
2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow
CoRR, 2011
2010
Program Analysis Probably Counts: Discussant Contribution for the <i>Computer Journal Lecture</i> by Chris Hankin.
Comput. J., 2010
Proceedings of the Formal Methods for Quantitative Aspects of Programming Languages, 2010
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
On Adaboost and Optimal Betting Strategies.
Proceedings of The 2009 International Conference on Data Mining, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Lagrange multipliers and maximum information leakage in different observational models.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
2007
J. Comput. Secur., 2007
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2007
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
2005
J. Log. Comput., 2005
2004
Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, 2004
2002
Theor. Comput. Sci., 2002
2001
Proceedings of the Workshop on Quantitative Aspects of Programming Laguages, 2001
2000
1999
Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science, 1999
1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Proceedings of the Compiler Construction, 7th International Conference, 1998
1995
Theor. Comput. Sci., 1995
1993
Equivalences of Transition Systems in an Algebraic Framework.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993
1991
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991
Proceedings of the Category Theory and Computer Science, 1991