Luca Durante

Orcid: 0000-0001-9319-7620

According to our database1, Luca Durante authored at least 46 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Improving performance and cyber-attack resilience in multi-firewall industrial networks.
Proceedings of the 18th IEEE International Conference on Factory Communication Systems, 2022

Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior<sup>*</sup>.
Proceedings of the IECON 2022, 2022

Distributed Filtering in Industrial Networks.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2021
A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks.
IEEE Trans. Inf. Forensics Secur., 2021

An Algorithm for Security Policy Migration in Multiple Firewall Networks.
Proceedings of the Italian Conference on Cybersecurity, 2021

2019
A comprehensive approach to the automatic refinement and verification of access control policies.
Comput. Secur., 2019

2018
Performance Evaluation and Modeling of an Industrial Application-Layer Firewall.
IEEE Trans. Ind. Informatics, 2018

Toward attribute-based access control policy in industrial networked systems.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

2017
Detection of attacks based on known vulnerabilities in industrial networked systems.
J. Inf. Secur. Appl., 2017

Leveraging SDN to improve security in industrial networks.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

Automated fixing of access policy implementation in Industrial Networked Systems.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

A model for the analysis of security policies in service function chains.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

2016
Performance of Firewalls for Industrial Applications.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Performance impact of commercial industrial firewalls on networked control systems.
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016

2015
Semiautomated Verification of Access Control Implementation in Industrial Networked Systems.
IEEE Trans. Ind. Informatics, 2015

A twofold model for the analysis of access control policies in industrial networked systems.
Comput. Stand. Interfaces, 2015

Analysis of access control policies in networked embedded systems: A case study.
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015

A semi-graphical modeling framework for the automated analysis of networked systems security.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

2014
On the description of access control policies in networked industrial systems.
Proceedings of the 10th IEEE Workshop on Factory Communication Systems, 2014

Automated Analysis of Access Policies in Industrial Plants.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

System-level performance of an automation solution based on industry standards.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

2013
Review of Security Issues in Industrial Networks.
IEEE Trans. Ind. Informatics, 2013

A Model for the Analysis of Security Policies in Industrial Networks.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2012
System configuration check against security policies in industrial networks.
Proceedings of the 7th IEEE International Symposium on Industrial Embedded Systems, 2012

Modeling Emergency Response Plans with Coloured Petri Nets.
Proceedings of the Critical Information Infrastructures Security, 2012

2009
Detecting Chains of Vulnerabilities in Industrial Networks.
IEEE Trans. Ind. Informatics, 2009

Tools for cryptographic protocols analysis: A technical and experimental comparison.
Comput. Stand. Interfaces, 2009

2008
Efficient representation of the attacker's knowledge in cryptographic protocols analysis.
Formal Aspects Comput., 2008

2007
Improving the security of industrial networks by means of formal verification.
Comput. Stand. Interfaces, 2007

Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

2006
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus.
Int. J. Found. Comput. Sci., 2006

Comparing lexical analysis tools for buffer overflow detection in network software.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
Exploiting Symmetries for Testing Equivalence in the Spi Calculus.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Automatic testing equivalence verification of spi calculus specifications.
ACM Trans. Softw. Eng. Methodol., 2003

A New Knowledge Representation Strategy for Cryptographic Protocol Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003

2001
A new CAN-like field network based on a star topology.
Comput. Stand. Interfaces, 2001

2000
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification.
Proceedings of the Formal Techniques for Distributed System Development, 2000

1997
Adaptive bandwidth balancing mechanisms for DQDB networks.
Comput. Commun., 1997

1994
Implementation of static semantic analysis of LOTOS specifications.
Softw. Eng. J., 1994

A LOTOS specification of the SERCOS field-bus protocol.
Proceedings of the SEKE'94, 1994


  Loading...