Riccardo Sisto

According to our database1, Riccardo Sisto authored at least 98 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Multipoint Alternate-Marking Method for Passive and Hybrid Performance Monitoring.
RFC, August, 2020

Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems.
Proceedings of the 16th IEEE International Conference on Factory Communication Systems, 2020

Automated optimal firewall orchestration and configuration in virtualized networks.
Proceedings of the NOMS 2020, 2020

Introducing programmability and automation in the synthesis of virtual firewall rules.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Multipoint Passive Monitoring in Packet Networks.
IEEE/ACM Trans. Netw., 2019

Formally specifying and checking policies and anomalies in service function chaining.
J. Netw. Comput. Appl., 2019

A Framework for Verification-Oriented User-Friendly Network Function Modeling.
IEEE Access, 2019

Detecting Injection Attacks on Cooperative Adaptive Cruise Control.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

Towards a fully automated and optimized network security functions orchestration.
Proceedings of the 2019 4th International Conference on Computing, 2019

Performance measurements of QUIC communications.
Proceedings of the Applied Networking Research Workshop, 2019

An efficient data exchange mechanism for chained network functions.
J. Parallel Distributed Comput., 2018

Seamless Configuration of Virtual Network Functions in Data Center Provider Networks.
J. Netw. Syst. Manag., 2018

Formally sound implementations of security protocols with JavaSPI.
Formal Aspects Comput., 2018

Formally verified latency-aware VNF placement in industrial Internet of things.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

Virtual Network Embedding with Formal Reachability Assurance.
Proceedings of the 14th International Conference on Network and Service Management, 2018

A formal approach for network security policy validation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Push applications and dynamic content generation over content-centric networking.
Int. J. Commun. Syst., 2017

Formal verification of LTE-UMTS and LTE-LTE handover procedures.
Comput. Stand. Interfaces, 2017

A Framework for User-Friendly Verification-Oriented VNF Modeling.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs.
IEEE/ACM Trans. Netw., 2016

DynNav: Toward Open and Interoperable Navigation Services.
IT Prof., 2016

Final Service Provider DevOps concept and evaluation.
CoRR, 2016

Service Provider DevOps network capabilities and tools.
CoRR, 2015

Initial Service Provider DevOps concept, capabilities and proposed tools.
CoRR, 2015

Formal verification of LTE-UMTS handover procedures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context.
Proceedings of the Service Oriented and Cloud Computing - 4th European Conference, 2015

Safe abstractions of data encodings in formal security protocol models.
Formal Aspects Comput., 2014

Formal verification of security protocol implementations: a survey.
Formal Aspects Comput., 2014

Automatic Configuration of Opaque Network Functions in CMS.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

An efficient data exchange algorithm for chained network functions.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

Automated Formal Verification of Application-specific Security Properties.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Resource management policies for cloud-based interactive 3D applications.
Proceedings of the IEEE International Conference on Communications, 2013

PIT overload analysis in content centric networks.
Proceedings of the ICN'13, 2013

Formally based semi-automatic implementation of an open security protocol.
J. Syst. Softw., 2012

Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification.
Proceedings of the 2012 Ubiquitous Positioning, 2012

Efficient multistriding of large non-deterministic finite state automata for deep packet inspection.
Proceedings of IEEE International Conference on Communications, 2012

Visual Model-Driven Design, Verification and Implementation of Security Protocols.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

SPAF: stateless FSA-based packet filters.
IEEE/ACM Trans. Netw., 2011

Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access.
IEEE Trans. Ind. Informatics, 2011

JavaSPI: A Framework for Security Protocol Implementation.
Int. J. Secur. Softw. Eng., 2011

An approach to refinement checking of SysML requirements.
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011

The Java SPI Framework for Security Protocol Implementation.
Proceedings of the Sixth International Conference on Availability, 2011

Provably correct Java implementations of Spi Calculus security protocols specifications.
Comput. Secur., 2010

iNFAnt: NFA pattern matching on GPGPU devices.
Comput. Commun. Rev., 2010

Detecting Chains of Vulnerabilities in Industrial Networks.
IEEE Trans. Ind. Informatics, 2009

Tools for cryptographic protocols analysis: A technical and experimental comparison.
Comput. Stand. Interfaces, 2009

An Experience in Embedded Control Software Verification.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

Efficient representation of the attacker's knowledge in cryptographic protocols analysis.
Formal Aspects Comput., 2008

Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Vulnerability Modelling for the Analysis of Network Attacks.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

A Lightweight Security Analyzer inside GCC.
Proceedings of the The Third International Conference on Availability, 2008

Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
Proceedings of the The Third International Conference on Availability, 2008

A Grid-Powered Framework to Support Courses on Distributed Programming.
IEEE Trans. Educ., 2007

Improving the security of industrial networks by means of formal verification.
Comput. Stand. Interfaces, 2007

An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus.
Int. J. Found. Comput. Sci., 2006

Comparing lexical analysis tools for buffer overflow detection in network software.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

Automatic Detection of Attacks on Cryptographic Protocols: A Case Study.
Proceedings of the Detection of Intrusions and Malware, 2005

Implementing innovative services supporting user and terminal mobility: the SCARAB architecture.
J. Syst. Softw., 2004

Exploiting Symmetries for Testing Equivalence in the Spi Calculus.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Automatic testing equivalence verification of spi calculus specifications.
ACM Trans. Softw. Eng. Methodol., 2003

Temporal logic properties of Java objects.
J. Syst. Softw., 2003

A New Knowledge Representation Strategy for Cryptographic Protocol Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003

A configurable mobile agent data protection protocol.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Experiments on Formal Verification of Mobile Agent Data Integrity Properties.
Proceedings of the WOA 2002: Dagli Oggetti agli Agenti. 3rd AI*IA/TABOO Joint Workshop "From Objects to Agents": From Information to Knowledge, 2002

Using SPIN to Verify Security Properties of Cryptographic Protocols.
Proceedings of the Model Checking of Software, 2002

Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001

Using Data Flow Analysis to Infer Type Information in Java Bytecode.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the Mobile Agents, 5th International Conference, 2001

SCARAB: Innovative Services Supporting User and Terminal Mobility.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Using binary decision diagrams for representation and analysis of communication protocols.
Comput. Networks, 2000

Using Garbage Collection in Model Checking.
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000

A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification.
Proceedings of the Formal Techniques for Distributed System Development, 2000

A Deadlock Detection Tool for Concurrent Java Programs.
Softw. Pract. Exp., 1999

Distributed-Memory Model Checking with SPIN.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

dSPIN: A Dynamic Extension of SPIN.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

Static Analysis of Java Multithreaded and Distributed Applications.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

A Java-based Formal Development Environment for Factory Communication Systems.
Proceedings of the 1st International Conference on Application of Concurrency to System Design (ACSD '98), 1998

Adaptive bandwidth balancing mechanisms for DQDB networks.
Comput. Commun., 1997

Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions.
IEEE Trans. Computers, 1995

A method to build symbolic representations of LOTOS specifications.
Proceedings of the Protocol Specification, 1995

A LOTOS extension for the performance analysis of distributed systems.
IEEE/ACM Trans. Netw., 1994

Implementation of static semantic analysis of LOTOS specifications.
Softw. Eng. J., 1994

A LOTOS specification of the SERCOS field-bus protocol.
Proceedings of the SEKE'94, 1994

Integrating Peforamnce Analysis in the Context of LOTOS-Based Design.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

Rapid Prototyping of Protocols from LOTOS Specifications.
Softw. Pract. Exp., 1993

Throughput analysis of timed token protocols in double ring networks.
Proceedings of the 17th Conference on Local Computer Networks, 1992

Probabilistic Characterization of Algebraic Protocol Specifications.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

A Protocol for Multirendezvous of LOTOS Processes.
IEEE Trans. Computers, 1991

Parallel CRC generation.
IEEE Micro, 1990

An abstract execution model for basic LOTOS.
Softw. Eng. J., 1990

Modeling the execution of LOTOS specifications by cooperating extended finite state machines.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990