Riccardo Sisto

Orcid: 0000-0002-3142-2383

According to our database1, Riccardo Sisto authored at least 127 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Two-Fold Traffic Flow Model for Network Security Management.
IEEE Trans. Netw. Serv. Manag., August, 2024

Automation for Network Security Configuration: State of the Art and Research Trends.
ACM Comput. Surv., March, 2024

Security Automation in next-generation Networks and Cloud environments.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Automatic and optimized firewall reconfiguration.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

An intent-based solution for network isolation in Kubernetes.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

A Looping Process for Cyberattack Mitigation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Explicit Host-to-Network Flow Measurements Techniques.
RFC, October, 2023

A novel abstraction for security configuration in virtual networks.
Comput. Networks, June, 2023

Automated Firewall Configuration in Virtual Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Security automation for multi-cluster orchestration in Kubernetes.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Automating the configuration of firewalls and channel protection systems in virtual networks.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Towards Security Automation in Virtual Networks.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

A demonstration of VEREFOO: an automated framework for virtual firewall configuration.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Formal Verification of a V2X Privacy Preserving Scheme Using Proverif.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Formal Verification of the FDO Protocol.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2022
Clustered Alternate-Marking Method.
RFC, December, 2022

Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks.
Comput. Networks, 2022

Security Automation using Traffic Flow Modeling.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

2021
Improving the Formal Verification of Reachability Policies in Virtualized Networks.
IEEE Trans. Netw. Serv. Manag., 2021

A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks.
IEEE Trans. Ind. Informatics, 2021

A novel approach for security function graph configuration and deployment.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

2020
Multipoint Alternate-Marking Method for Passive and Hybrid Performance Monitoring.
RFC, August, 2020

Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware.
IEEE Veh. Technol. Mag., 2020

Securing SOME/IP for In-Vehicle Service Protection.
IEEE Trans. Veh. Technol., 2020

Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems.
Proceedings of the 16th IEEE International Conference on Factory Communication Systems, 2020

Automated optimal firewall orchestration and configuration in virtualized networks.
Proceedings of the NOMS 2020, 2020

Introducing programmability and automation in the synthesis of virtual firewall rules.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks.
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020

2019
Multipoint Passive Monitoring in Packet Networks.
IEEE/ACM Trans. Netw., 2019

Formally specifying and checking policies and anomalies in service function chaining.
J. Netw. Comput. Appl., 2019

A Framework for Verification-Oriented User-Friendly Network Function Modeling.
IEEE Access, 2019

Detecting Injection Attacks on Cooperative Adaptive Cruise Control.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

Towards a fully automated and optimized network security functions orchestration.
Proceedings of the 2019 4th International Conference on Computing, 2019

Performance measurements of QUIC communications.
Proceedings of the Applied Networking Research Workshop, 2019

2018
An efficient data exchange mechanism for chained network functions.
J. Parallel Distributed Comput., 2018

Seamless Configuration of Virtual Network Functions in Data Center Provider Networks.
J. Netw. Syst. Manag., 2018

Formally sound implementations of security protocols with JavaSPI.
Formal Aspects Comput., 2018

Formally verified latency-aware VNF placement in industrial Internet of things.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

Virtual Network Embedding with Formal Reachability Assurance.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
A formal approach for network security policy validation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Push applications and dynamic content generation over content-centric networking.
Int. J. Commun. Syst., 2017

Formal verification of LTE-UMTS and LTE-LTE handover procedures.
Comput. Stand. Interfaces, 2017

A Framework for User-Friendly Verification-Oriented VNF Modeling.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs.
IEEE/ACM Trans. Netw., 2016

DynNav: Toward Open and Interoperable Navigation Services.
IT Prof., 2016

Final Service Provider DevOps concept and evaluation.
CoRR, 2016

2015
Service Provider DevOps network capabilities and tools.
CoRR, 2015

Initial Service Provider DevOps concept, capabilities and proposed tools.
CoRR, 2015

A formal model of network policy analysis.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

Wireless for the factory: The Wi-Fact analysis.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

Interest Flooding Attack Countermeasures Assessment on Content Centric Networking.
Proceedings of the 12th International Conference on Information Technology, 2015

Formal verification of LTE-UMTS handover procedures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context.
Proceedings of the Service Oriented and Cloud Computing - 4th European Conference, 2015

2014
Safe abstractions of data encodings in formal security protocol models.
Formal Aspects Comput., 2014

Formal verification of security protocol implementations: a survey.
Formal Aspects Comput., 2014

Automatic Configuration of Opaque Network Functions in CMS.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

An efficient data exchange algorithm for chained network functions.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

Automated Formal Verification of Application-specific Security Properties.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

2013
Resource management policies for cloud-based interactive 3D applications.
Proceedings of the IEEE International Conference on Communications, 2013

PIT overload analysis in content centric networks.
Proceedings of the ICN'13, 2013

2012
Formally based semi-automatic implementation of an open security protocol.
J. Syst. Softw., 2012

Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification.
Proceedings of the 2012 Ubiquitous Positioning, 2012

Efficient multistriding of large non-deterministic finite state automata for deep packet inspection.
Proceedings of IEEE International Conference on Communications, 2012

Visual Model-Driven Design, Verification and Implementation of Security Protocols.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
SPAF: stateless FSA-based packet filters.
IEEE/ACM Trans. Netw., 2011

Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access.
IEEE Trans. Ind. Informatics, 2011

JavaSPI: A Framework for Security Protocol Implementation.
Int. J. Secur. Softw. Eng., 2011

An approach to refinement checking of SysML requirements.
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011

The Java SPI Framework for Security Protocol Implementation.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Provably correct Java implementations of Spi Calculus security protocols specifications.
Comput. Secur., 2010

iNFAnt: NFA pattern matching on GPGPU devices.
Comput. Commun. Rev., 2010

2009
Detecting Chains of Vulnerabilities in Industrial Networks.
IEEE Trans. Ind. Informatics, 2009

Tools for cryptographic protocols analysis: A technical and experimental comparison.
Comput. Stand. Interfaces, 2009

An Experience in Embedded Control Software Verification.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

2008
Efficient representation of the attacker's knowledge in cryptographic protocols analysis.
Formal Aspects Comput., 2008

Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Vulnerability Modelling for the Analysis of Network Attacks.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

A Lightweight Security Analyzer inside GCC.
Proceedings of the The Third International Conference on Availability, 2008

Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Grid-Powered Framework to Support Courses on Distributed Programming.
IEEE Trans. Educ., 2007

Improving the security of industrial networks by means of formal verification.
Comput. Stand. Interfaces, 2007

An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

2006
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus.
Int. J. Found. Comput. Sci., 2006

Comparing lexical analysis tools for buffer overflow detection in network software.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture.
J. Syst. Softw., 2004

Exploiting Symmetries for Testing Equivalence in the Spi Calculus.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Automatic testing equivalence verification of spi calculus specifications.
ACM Trans. Softw. Eng. Methodol., 2003

Temporal logic properties of Java objects.
J. Syst. Softw., 2003

A New Knowledge Representation Strategy for Cryptographic Protocol Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003

A configurable mobile agent data protection protocol.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Experiments on Formal Verification of Mobile Agent Data Integrity Properties.
Proceedings of the WOA 2002: Dagli Oggetti agli Agenti. 3rd AI*IA/TABOO Joint Workshop "From Objects to Agents": From Information to Knowledge, 2002

Using SPIN to Verify Security Properties of Cryptographic Protocols.
Proceedings of the Model Checking of Software, 2002

2001
Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001

Using Data Flow Analysis to Infer Type Information in Java Bytecode.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the Mobile Agents, 5th International Conference, 2001

SCARAB: Innovative Services Supporting User and Terminal Mobility.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
Using binary decision diagrams for representation and analysis of communication protocols.
Comput. Networks, 2000

Using Garbage Collection in Model Checking.
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000

A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification.
Proceedings of the Formal Techniques for Distributed System Development, 2000

1999
A Deadlock Detection Tool for Concurrent Java Programs.
Softw. Pract. Exp., 1999

Distributed-Memory Model Checking with SPIN.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

dSPIN: A Dynamic Extension of SPIN.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

1998
Static Analysis of Java Multithreaded and Distributed Applications.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

A Java-based Formal Development Environment for Factory Communication Systems.
Proceedings of the 1st International Conference on Application of Concurrency to System Design (ACSD '98), 1998

1997
Adaptive bandwidth balancing mechanisms for DQDB networks.
Comput. Commun., 1997

1995
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions.
IEEE Trans. Computers, 1995

A method to build symbolic representations of LOTOS specifications.
Proceedings of the Protocol Specification, 1995

1994
A LOTOS extension for the performance analysis of distributed systems.
IEEE/ACM Trans. Netw., 1994

Implementation of static semantic analysis of LOTOS specifications.
Softw. Eng. J., 1994

A LOTOS specification of the SERCOS field-bus protocol.
Proceedings of the SEKE'94, 1994

Integrating Peforamnce Analysis in the Context of LOTOS-Based Design.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Rapid Prototyping of Protocols from LOTOS Specifications.
Softw. Pract. Exp., 1993

1992
Throughput analysis of timed token protocols in double ring networks.
Proceedings of the 17th Conference on Local Computer Networks, 1992

Probabilistic Characterization of Algebraic Protocol Specifications.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
A Protocol for Multirendezvous of LOTOS Processes.
IEEE Trans. Computers, 1991

1990
Parallel CRC generation.
IEEE Micro, 1990

The use of Estelle to specify manufacturing systems.
Microprocessing and Microprogramming, 1990

An abstract execution model for basic LOTOS.
Softw. Eng. J., 1990

Modeling the execution of LOTOS specifications by cooperating extended finite state machines.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990


  Loading...