Author of the publication

Engineering of Trust Analysis-Driven Digital Twins for a Medical Device.

, , , , , and . ECSA (Tracks and Workshops), volume 13928 of Lecture Notes in Computer Science, page 467-482. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Blockchain-Based E-Voting Systems., , , , and . BIS (Workshops), volume 373 of Lecture Notes in Business Information Processing, page 274-286. Springer, (2019)Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges., , , , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 79-91. Springer, (2020)A model checking-based approach for security policy verification of mobile systems., , and . Formal Aspects Comput., 23 (5): 627-648 (2011)Static analysis of security properties in mobile ambients.. Ca' Foscari University of Venice, Italy, (2005)Towards ASM-Based Automated Formal Verification of Security Protocols., , and . ABZ, volume 12709 of Lecture Notes in Computer Science, page 17-33. Springer, (2021)Automated Verification of Security Policies in Mobile Code., , and . IFM, volume 4591 of Lecture Notes in Computer Science, page 37-53. Springer, (2007)The binary perfect phylogeny with persistent characters., , , and . Theor. Comput. Sci., (2012)Boundary Inference for Enforcing Security Policies in Mobile Ambients., , , and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 383-395. Kluwer, (2002)The THREAT-ARREST Cyber Range Platform., , , , , , , , , and 11 other author(s). CSR, page 422-427. IEEE, (2021)Towards Trust-preserving Continuous Co-evolution of Digital Twins., , , , , , , , , and . ICSA Companion, page 96-99. IEEE, (2022)