Name
Affiliation
Papers
RICCARDO SISTO
Politecnico di Torino, Torino, Italy
85
Collaborators
Citations 
PageRank 
109
556
56.79
Referers 
Referees 
References 
1045
1175
839
Search Limit
1001000
Title
Citations
PageRank
Year
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks00.342022
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks10.352021
Improving the Formal Verification of Reachability Policies in Virtualized Networks20.372021
Introducing programmability and automation in the synthesis of virtual firewall rules00.342020
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems00.342020
Securing SOME/IP for In-Vehicle Service Protection20.632020
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware10.342020
Automated optimal firewall orchestration and configuration in virtualized networks.00.342020
Performance measurements of QUIC communications.00.342019
Multipoint Passive Monitoring in Packet Networks00.342019
Formally specifying and checking policies and anomalies in service function chaining.10.352019
Towards a fully automated and optimized network security functions orchestration00.342019
Detecting Injection Attacks on Cooperative Adaptive Cruise Control10.382019
A Framework for Verification-Oriented User-Friendly Network Function Modeling.00.342019
An efficient data exchange mechanism for chained network functions.00.342018
Formally sound implementations of security protocols with JavaSPI.00.342018
Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks10.352018
Seamless Configuration of Virtual Network Functions in Data Center Provider Networks.10.362018
Push applications and dynamic content generation over content-centric networking.00.342017
A Framework for User-Friendly Verification-Oriented VNF Modeling00.342017
Formal verification of LTE-UMTS and LTE-LTE handover procedures.30.372017
A formal approach for network security policy validation.50.442017
DynNav: Toward Open and Interoperable Navigation Services.00.342016
Final Service Provider DevOps concept and evaluation.20.462016
Initial Service Provider DevOps concept, capabilities and proposed tools00.342015
Service Provider DevOps network capabilities and tools.20.402015
Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context.80.592015
Formal verification of LTE-UMTS handover procedures.30.442015
Safe abstractions of data encodings in formal security protocol models.20.362014
Automated Formal Verification of Application-specific Security Properties10.362014
Formal verification of security protocol implementations: a survey.90.522014
Automatic Configuration of Opaque Network Functions in CMS20.432014
PIT overload analysis in content centric networks.210.852013
Visual Model-Driven Design, Verification and Implementation of Security Protocols30.422012
Formally based semi-automatic implementation of an open security protocol60.492012
Efficient multistriding of large non-deterministic finite state automata for deep packet inspection10.362012
Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification20.672012
Fast numerical solution of nonlinear nonlocal cochlear models10.372011
JavaSPI: A Framework for Security Protocol Implementation100.612011
The Java SPI Framework for Security Protocol Implementation60.492011
An approach to refinement checking of SysML requirements10.372011
SPAF: stateless FSA-based packet filters50.422011
iNFAnt: NFA pattern matching on GPGPU devices401.632010
Provably correct Java implementations of Spi Calculus security protocols specifications110.512010
An experience in embedded control software verification00.342009
Tools for cryptographic protocols analysis: A technical and experimental comparison60.632009
Detecting Chains of Vulnerabilities in Industrial Networks181.402009
A Lightweight Security Analyzer inside GCC20.362008
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models30.392008
Efficient representation of the attacker’s knowledge in cryptographic protocols analysis10.402008
  • 1
  • 2