Publications

 
   2025   |   2024   |   2023   |   2022   |   2021   |   2020   |   2019   |   2018   |   2017   |   2016   
  • Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
    zdemir S.nmez F, Hankin C and Malacaria P
    Computers and Security, Elsevier vol. 123 
    14-10-2022
  • InfERL: scalable and extensible Erlang static analysis
    Hajdu Á, Marescotti M, Suzanne T, Mao K, Grigore R, Gustafsson P and Distefano D
    Proceedings of the 21st ACM SIGPLAN International Workshop on Erlang., 33-39.  
    06-09-2022
  • Decision support for healthcare cyber security
    Sönmez FÖ, Hankin C and Malacaria P
    Computers and Security, Elsevier vol. 122, 102865-102865.  
    04-08-2022
  • Conjuring with Computation, A Manual of Magic and Computing for Beginners
    Curzon P and McOwan PW
     
    23-06-2022
  • Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations
    Focke J, Goldberg LA, Roth M and Zivný S
    Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems., 315-324.  
    12-06-2022
  • Counting small induced subgraphs with hereditary properties
    Focke J and Roth M
    Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing., 1543-1551.  
    09-06-2022
  • Value iteration for simple stochastic games: Stopping criterion and learning algorithm
    Eisentraut J, Kelmendi E, Křetínský J and Weininger M
    Information and Computation, Elsevier vol. 285 
    01-05-2022
  • Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
    Buczkowski P, Malacaria P, Hankin C and Fielder A
    Sat-CPS '22: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems., 21-30.  
    28-04-2022
  • Optimal Security Hardening over a Probabilistic Attack Graph
    Buczkowski P, Malacaria P, Hankin C and Fielder A
    Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems., 21-30.  
    18-04-2022
  • FAUSTA: Scaling Dynamic Analysis with Traffic Generation at WhatsApp
    Mao K, Kapus T, Petrou L, Hajdu A, Marescotti M, Loscher A, Harman M and Distefano D
    2022 IEEE Conference on Software Testing, Verification and Validation (ICST). vol. 00, 267-278.  
    14-04-2022
  • Bisimulation as a logical relation
    Robinson E, Hermida C, Reddy U and Sanatamaria A
    Mathematical Structures in Computer Science, Cambridge University Press (Cup) Editors: Hasegawa M. 
    12-04-2022
  • Exact and Approximate Pattern Counting in Degenerate Graphs: New Algorithms, Hardness Results, and Complexity Dichotomies
    Bressan M and Roth M
    2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS). vol. 00, 276-285.  
    10-02-2022
  • Verification Witnesses.
    Beyer D, Dangl M, Dietsch D, Heizmann M, Lemberger T and Tautschnig M
    Acm Trans. Softw. Eng. Methodol. vol. 31, 57:1-57:1.  
    01-01-2022
  • On-The-Fly Bisimilarity Checking for Fresh-Register Automata
    Bandukara MH and Tzevelekos N
    Lecture Notes in Computer Science. vol. 13649, 187-204.  
    01-01-2022
  • Impartial Games: A Challenge for Reinforcement Learning.
    Zhou B and Riis S
    Corr vol. abs/2205.12787 
    01-01-2022
  • From Bounded Checking to Verification of Equivalence via Symbolic Up-to Techniques
    Koutavas V, Lin YY and Tzevelekos N
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 13244 LNCS, 178-195.  
    01-01-2022