default search action
Luca Durante
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c30]Manuel Cheminod, Luca Durante:
Distributed Filtering in Industrial Networks. CyberSec4Europe 2022: 80-93 - [c29]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Lucia Seno, Adriano Valenzano:
Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior*. IECON 2022: 1-6 - [c28]Lucia Seno, Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano:
Improving performance and cyber-attack resilience in multi-firewall industrial networks. WFCS 2022: 1-8 - 2021
- [j16]Luca Durante, Lucia Seno, Adriano Valenzano:
A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks. IEEE Trans. Inf. Forensics Secur. 16: 2637-2651 (2021) - [c27]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
An Algorithm for Security Policy Migration in Multiple Firewall Networks. ITASEC 2021: 344-359
2010 – 2019
- 2019
- [j15]Manuel Cheminod, Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
A comprehensive approach to the automatic refinement and verification of access control policies. Comput. Secur. 80: 186-199 (2019) - 2018
- [j14]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Performance Evaluation and Modeling of an Industrial Application-Layer Firewall. IEEE Trans. Ind. Informatics 14(5): 2159-2170 (2018) - [c26]Manuel Cheminod, Luca Durante, Fulvio Valenza, Adriano Valenzano:
Toward attribute-based access control policy in industrial networked systems. WFCS 2018: 1-9 - 2017
- [j13]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Detection of attacks based on known vulnerabilities in industrial networked systems. J. Inf. Secur. Appl. 34: 153-165 (2017) - [c25]Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
A model for the analysis of security policies in service function chains. NetSoft 2017: 1-6 - [c24]Manuel Cheminod, Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
Automated fixing of access policy implementation in Industrial Networked Systems. WFCS 2017: 1-9 - [c23]Manuel Cheminod, Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano, Claudio Zunino:
Leveraging SDN to improve security in industrial networks. WFCS 2017: 1-7 - [i2]Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
A model for the analysis of security policies in service function chains. CoRR abs/1710.03486 (2017) - [i1]Manuel Cheminod, Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
Automated fixing of access policy implementation in Industrial Networked Systems. CoRR abs/1710.03491 (2017) - 2016
- [c22]Manuel Cheminod, Luca Durante, Adriano Valenzano, Claudio Zunino:
Performance impact of commercial industrial firewalls on networked control systems. ETFA 2016: 1-8 - [c21]Manuel Cheminod, Luca Durante, Marcello Maggiora, Adriano Valenzano, Claudio Zunino:
Performance of Firewalls for Industrial Applications. ICS-CSR 2016 - 2015
- [j12]Ivan Cibrario Bertolotti, Luca Durante, Lucia Seno, Adriano Valenzano:
A twofold model for the analysis of access control policies in industrial networked systems. Comput. Stand. Interfaces 42: 171-181 (2015) - [j11]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Semiautomated Verification of Access Control Implementation in Industrial Networked Systems. IEEE Trans. Ind. Informatics 11(6): 1388-1399 (2015) - [c20]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts. ICS-CSR 2015 - [c19]Manuel Cheminod, Luca Durante, Marcello Maggiora, Lucia Seno, Carmela Troilo, Adriano Valenzano:
A semi-graphical modeling framework for the automated analysis of networked systems security. RTSI 2015: 411-418 - [c18]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Analysis of access control policies in networked embedded systems: A case study. SIES 2015: 69-78 - 2014
- [c17]Andrea Ballarino, Alessandro Brusaferri, Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, Tingting Hu, Egidio Leo, Leonardo Nicolosi, Lucia Seno, Stefano Spinelli, Federico Tramarin, Adriano Valenzano, Stefano Vitturi:
System-level performance of an automation solution based on industry standards. ETFA 2014: 1-6 - [c16]Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano:
Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution. ETFA 2014: 1-8 - [c15]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Automated Analysis of Access Policies in Industrial Plants. ICS-CSR 2014 - [c14]Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
On the description of access control policies in networked industrial systems. WFCS 2014: 1-10 - 2013
- [j10]Manuel Cheminod, Luca Durante, Adriano Valenzano:
Review of Security Issues in Industrial Networks. IEEE Trans. Ind. Informatics 9(1): 277-293 (2013) - [c13]Ivan Cibrario Bertolotti, Luca Durante, Tingting Hu, Adriano Valenzano:
A Model for the Analysis of Security Policies in Industrial Networks. ICS-CSR 2013 - 2012
- [c12]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano:
Modeling Emergency Response Plans with Coloured Petri Nets. CRITIS 2012: 106-117 - [c11]Manuel Cheminod, Luca Durante, Adriano Valenzano:
System configuration check against security policies in industrial networks. SIES 2012: 247-265
2000 – 2009
- 2009
- [j9]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Tools for cryptographic protocols analysis: A technical and experimental comparison. Comput. Stand. Interfaces 31(5): 954-961 (2009) - [j8]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Davide Pozza, Riccardo Sisto, Adriano Valenzano:
Detecting Chains of Vulnerabilities in Industrial Networks. IEEE Trans. Ind. Informatics 5(2): 181-193 (2009) - 2008
- [j7]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Efficient representation of the attacker's knowledge in cryptographic protocols analysis. Formal Aspects Comput. 20(3): 303-348 (2008) - 2007
- [j6]Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Riccardo Sisto, Adriano Valenzano:
Improving the security of industrial networks by means of formal verification. Comput. Stand. Interfaces 29(3): 387-397 (2007) - [c10]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. DepCoS-RELCOMEX 2007: 11-18 - [c9]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. DepCoS-RELCOMEX 2007: 153-160 - 2006
- [j5]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. Int. J. Found. Comput. Sci. 17(4): 815-832 (2006) - [c8]Davide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano:
Comparing lexical analysis tools for buffer overflow detection in network software. COMSWARE 2006: 1-7 - 2005
- [c7]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. DIMVA 2005: 69-84 - 2004
- [c6]Davide Pozza, Riccardo Sisto, Luca Durante:
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus. AINA (1) 2004: 400-405 - [c5]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Exploiting Symmetries for Testing Equivalence in the Spi Calculus. ATVA 2004: 135-149 - 2003
- [j4]Luca Durante, Riccardo Sisto, Adriano Valenzano:
Automatic testing equivalence verification of spi calculus specifications. ACM Trans. Softw. Eng. Methodol. 12(2): 222-284 (2003) - [c4]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. FORTE 2003: 224-239 - [c3]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. TACAS 2003: 284-298 - 2001
- [j3]Gianluca Cena, Luca Durante, Adriano Valenzano:
A new CAN-like field network based on a star topology. Comput. Stand. Interfaces 23(3): 209-222 (2001) - 2000
- [c2]Luca Durante, Riccardo Sisto, Adriano Valenzano:
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification. FORTE 2000: 155-170
1990 – 1999
- 1997
- [j2]Gianluca Cena, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Adaptive bandwidth balancing mechanisms for DQDB networks. Comput. Commun. 20(9): 804-819 (1997) - 1994
- [j1]Luca Durante, Riccardo Sisto, Adriano Valenzano:
Implementation of static semantic analysis of LOTOS specifications. Softw. Eng. J. 9(2): 55-66 (1994) - [c1]Luca Durante, Riccardo Sisto, Adriano Valenzano:
A LOTOS specification of the SERCOS field-bus protocol. SEKE 1994: 139-147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint