Publications

   2025   |   2024   |   2023   |   2022   |   2021   |   2020   |   2019   |   2018   |   2017   |   2016   
  • zdemir S.nmez F, Hankin C and Malacaria P (2022). Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases. Computers and Security, Elsevier vol. 123 
    14-10-2022
  • Hajdu Á, Marescotti M, Suzanne T, Mao K, Grigore R, Gustafsson P and Distefano D (2022). InfERL: scalable and extensible Erlang static analysis. Proceedings of the 21st ACM SIGPLAN International Workshop on Erlang
    06-09-2022
  • Sönmez FÖ, Hankin C and Malacaria P (2022). Decision support for healthcare cyber security. Computers and Security, Elsevier vol. 122, 102865-102865.  
    04-08-2022
  • Curzon P and McOwan PW (2022). Conjuring with Computation, A Manual of Magic and Computing for Beginners. 
    23-06-2022
  • Focke J, Goldberg LA, Roth M and Zivný S (2022). Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations. Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
    12-06-2022
  • Focke J and Roth M (2022). Counting small induced subgraphs with hereditary properties. Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
    09-06-2022
  • Eisentraut J, Kelmendi E, Křetínský J and Weininger M (2022). Value iteration for simple stochastic games: Stopping criterion and learning algorithm. Information and Computation, Elsevier vol. 285 
    01-05-2022
  • Buczkowski P, Malacaria P, Hankin C and Fielder A (2022). Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool. 
    28-04-2022
  • Buczkowski P, Malacaria P, Hankin C and Fielder A (2022). Optimal Security Hardening over a Probabilistic Attack Graph. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
    18-04-2022
  • Mao K, Kapus T, Petrou L, Hajdu A, Marescotti M, Loscher A, Harman M and Distefano D (2022). FAUSTA: Scaling Dynamic Analysis with Traffic Generation at WhatsApp. 2022 IEEE Conference on Software Testing, Verification and Validation (ICST)
    14-04-2022
  • Robinson E, Hermida C, Reddy U and Sanatamaria A (2022). Bisimulation as a logical relation., Editors: Hasegawa M. Mathematical Structures in Computer Science, Cambridge University Press (CUP) 
    12-04-2022
  • Bressan M and Roth M (2022). Exact and Approximate Pattern Counting in Degenerate Graphs: New Algorithms, Hardness Results, and Complexity Dichotomies. 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)
    10-02-2022
  • Beyer D, Dangl M, Dietsch D, Heizmann M, Lemberger T and Tautschnig M (2022). Verification Witnesses. ACM Trans. Softw. Eng. Methodol. vol. 31, 57:1-57:1.  
    01-01-2022
  • Bandukara MH and Tzevelekos N (2022). On-The-Fly Bisimilarity Checking for Fresh-Register Automata. 
    01-01-2022
  • Zhou B and Riis S (2022). Impartial Games: A Challenge for Reinforcement Learning. CoRR vol. abs/2205.12787 
    01-01-2022
  • Koutavas V, Lin YY and Tzevelekos N (2022). From Bounded Checking to Verification of Equivalence via Symbolic Up-to Techniques. 
    01-01-2022