Follow
Luca Durante
Luca Durante
Nationale Research Council of Italy
Verified email at ieiit.cnr.it - Homepage
Title
Cited by
Cited by
Year
Review of security issues in industrial networks
M Cheminod, L Durante, A Valenzano
IEEE transactions on industrial informatics 9 (1), 277-293, 2012
4332012
Automatic testing equivalence verification of spi calculus specifications
L Durante, R Sisto, A Valenzano
ACM Transactions on Software Engineering and Methodology (TOSEM) 12 (2), 222-284, 2003
832003
Spi2java: Automatic cryptographic protocol java code generation from spi calculus
D Pozza, R Sisto, L Durante
18th International Conference on Advanced Information Networking and …, 2004
802004
Detecting chains of vulnerabilities in industrial networks
M Cheminod, IC Bertolotti, L Durante, P Maggi, D Pozza, R Sisto, ...
IEEE Transactions on Industrial Informatics 5 (2), 181-193, 2009
462009
Standard field bus networks for industrial applications
G Cena, L Durante, A Valenzano
Computer standards & interfaces 17 (2), 155-167, 1995
461995
Performance evaluation and modeling of an industrial application-layer firewall
M Cheminod, L Durante, L Seno, A Valenzano
IEEE Transactions on Industrial Informatics 14 (5), 2159-2170, 2018
432018
Comparing lexical analysis tools for buffer overflow detection in network software
D Pozza, R Sisto, L Durante, A Valenzano
2006 1st International Conference on Communication Systems Software …, 2006
362006
A new CAN-like field network based on a star topology
G Cena, L Durante, A Valenzano
Computer Standards & Interfaces 23 (3), 209-222, 2001
332001
Leveraging SDN to improve security in industrial networks
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano, C Zunino
2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS …, 2017
272017
Detection of attacks based on known vulnerabilities in industrial networked systems
M Cheminod, L Durante, L Seno, A Valenzano
journal of information security and applications 34, 153-165, 2017
252017
A state-exploration technique for spi-calculus testing-equivalence verification
L Durante, R Sisto, A Valenzano
International Conference on Protocol Specification, Testing and Verification …, 2000
252000
Semiautomated verification of access control implementation in industrial networked systems
M Cheminod, L Durante, L Seno, A Valenzano
IEEE Transactions on Industrial Informatics 11 (6), 1388-1399, 2015
242015
A comprehensive approach to the automatic refinement and verification of access control policies
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano
Computers & Security 80, 186-199, 2019
222019
A model for the analysis of security policies in service function chains
L Durante, L Seno, F Valenza, A Valenzano
2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017
212017
Tools for cryptographic protocols analysis: A technical and experimental comparison
M Cheminod, IC Bertolotti, L Durante, R Sisto, A Valenzano
Computer Standards & Interfaces 31 (5), 954-961, 2009
172009
Latency evaluation of a firewall for industrial networks based on the tofino industrial security solution
M Cereia, IC Bertolotti, L Durante, A Valenzano
Proceedings of the 2014 IEEE emerging technology and factory automation …, 2014
162014
On the description of access control policies in networked industrial systems
M Cheminod, L Durante, L Seno, A Valenzano
2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014
162014
Improving the security of industrial networks by means of formal verification
IC Bertolotti, L Durante, P Maggi, R Sisto, A Valenzano
Computer Standards & Interfaces 29 (3), 387-397, 2007
162007
Performance impact of commercial industrial firewalls on networked control systems
M Cheminod, L Durante, A Valenzano, C Zunino
2016 IEEE 21st international conference on emerging technologies and factory …, 2016
152016
A twofold model for the analysis of access control policies in industrial networked systems
IC Bertolotti, L Durante, L Seno, A Valenzano
Computer Standards & Interfaces 42, 171-181, 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20