Stylianos Basagiannis

Orcid: 0000-0002-4513-0541

According to our database1, Stylianos Basagiannis authored at least 38 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SMT-Based Stability Verification of an Industrial Switched PI Control Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2021
The VALU3S ECSEL project: Verification and validation of automated systems safety and security.
Microprocess. Microsystems, November, 2021

Learning Moore machines from input-output traces.
Int. J. Softw. Tools Technol. Transf., 2021

2020
ReForm: A Tool for Rapid Requirements Formalization.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

Second Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2020 Workshop (InterAVT 2020).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

Efficient Translation of Safety LTL to DFA Using Symbolic Automata Learning and Inductive Inference.
Proceedings of the Computer Safety, Reliability, and Security, 2020

Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020

The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2019
Preface.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2019

Formal Verification of Network Interlocking Control by Distributed Signal Boxes.
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019

2018
Formal Methods for Energy-Efficient EPONs.
IEEE Trans. Green Commun. Netw., 2018

Lessons Learned Using FMI Co-simulation for Model-Based Design of Cyber Physical Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, 2018

2017
Injecting Formal Verification in FMI-Based Co-simulations of Cyber-Physical Systems.
Proceedings of the Software Engineering and Formal Methods, 2017

Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design Approach.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Formal security analysis of near field communication using model checking.
Comput. Secur., 2016

Integrated tool chain for model-based design of Cyber-Physical Systems: The INTO-CPS project.
Proceedings of the 2016 2nd International Workshop on Modelling, 2016

2015
Towards Verification of Multicore Motor-Drive Controllers in Aerospace.
Proceedings of the Computer Safety, Reliability, and Security, 2015

2014
Security analysis of NFC relay attacks using probabilistic model checking.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2013
Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks.
IEEE Syst. J., 2013

Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013

2012
Formal analysis for robust anti-SPIT protection using model checking.
Int. J. Inf. Sec., 2012

Towards energy consumption evaluation of the SSL handshake protocol in mobile communications.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

2011
Synthesis of attack actions using model checking for the verification of security protocols.
Secur. Commun. Networks, 2011

Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach.
Comput. Secur., 2011

Quantitative analysis for authentication of low-cost RFID tags.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Quantitative model checking of an RSA-based email protocol on mobile devices.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
An intruder model with message inspection for model checking security protocols.
Comput. Secur., 2010

Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

A Formally Verified Mechanism for Countering SPIT.
Proceedings of the Critical Information Infrastructures Security, 2010

2009
Ανάπτυξη τυπικών μεθόδων για τον έλεγχο πρωτοκόλλων ασφαλείας
PhD thesis, 2009

State Space Reduction with Message Inspection in Security Protocol Model Checking
CoRR, 2009

Attacking an OT-Based Blind Signature Scheme
CoRR, 2009

Probabilistic model checking for the quantification of DoS security threats.
Comput. Secur., 2009

2008
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees.
Proceedings of the Computer Safety, 2007

2006
Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker.
Proceedings of the Parallel and Distributed Processing and Applications, 2006


  Loading...