Citation Impact
Citing Papers
Detecting format string vulnerabilities with type qualifiers
2001 Standout
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
2007 Standout
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
Permission re-delegation: attacks and defenses
2011 Standout
Exploiting Symmetries in Stochastic Process Algebras
1998
Hematopoietic Stem Cells Reversibly Switch from Dormancy to Self-Renewal during Homeostasis and Repair
2008
Metabolic Regulation of Hematopoietic Stem Cells in the Hypoxic Niche
2011 StandoutNobel
The bone marrow niche for haematopoietic stem cells
2014 StandoutNature
Mutation testing from probabilistic and stochastic finite state machines
2009
Static Analysis for the π-Calculus with Applications to Security
2001
A unifying approach to the security of distributed and multi-threaded programs1
2003
A Per Model of Secure Information Flow in Sequential Programs
2001
Protecting privacy using the decentralized label model
2000
Language-based information-flow security
2003 Standout
Process algebra for performance evaluation
2002
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
An efficient algorithm for aggregating PEPA models
2001
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
2010 Standout
A survey of trust in internet applications
2000 Standout
A Compositional Approach to Performance Modelling
1996
20 years of Electronic Commerce Research
2021 Standout
Blockchain 3.0 applications survey
2020
An Analysis and Survey of the Development of Mutation Testing
2010 Standout
Automatic creation of SQL Injection and cross-site scripting attacks
2009 Standout
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
2009 Standout
A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis
2009
A tool for model-checking Markov chains
2003
Secrecy by typing in security protocols
1999
TaintDroid
2014 Standout
Digitization, Digital Twins, Blockchain, and Industry 4.0 as Elements of Management Process in Enterprises in the Energy Sector
2021 Standout
An overview of fault tree analysis and its application in model based dependability analysis
2017 Standout
Access control and audit model for the multidimensional modeling of data warehouses
2005
A brief history of process algebra
2005
Optimal state-space lumping in Markov chains
2003
Coexistence of Quiescent and Active Adult Stem Cells in Mammals
2010 StandoutScience
Model-checking algorithms for continuous-time markov chains
2003 Standout
An enhanced e-commerce trust model for community based centralized systems
2012
Model-based evaluation: from dependability to security
2004 Standout
Works of Roberto Gorrieri being referenced
Foundations of security analysis and design IV : FOSAD 2006/2007 : tutorial lectures
2007
Foundations of Security Analysis and Design - Tutorial Lectures
2001
Foundations of Security Analysis and Design V
2009
Giving a net semantics to Markovian process algebra
2002
The Compositional Security Checker: a tool for the verification of information flow security properties
1997
A Classification of Security Properties for Process Algebras1
1995
Computational Methods in Systems Biology
2009
The theory of interactive generalized semi-Markov processes
2002
A tutorial on EMPA: A theory of concurrent processes with nondeterminism, priorities, probabilities and time
1998
Formal Performance Modelling and Evaluation of an Adaptive Mechanism for Packetised Audio over the Internet
1998