Roberto Vigo
Roberto Vigo
(former) PhD student, Technical University of Denmark
Verified email at imm.dtu.dk - Homepage
Title
Cited by
Cited by
Year
Process mining manifesto
W Van Der Aalst, A Adriansyah, AKA De Medeiros, F Arcieri, T Baier, ...
International conference on business process management, 169-194, 2011
12432011
Automated generation of attack trees
R Vigo, F Nielson, HR Nielson
2014 IEEE 27th Computer Security Foundations Symposium, 337-350, 2014
672014
A calculus for attribute-based communication
YA Alrahman, R De Nicola, M Loreti, F Tiezzi, R Vigo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1840-1845, 2015
442015
A calculus for quality
HR Nielson, F Nielson, R Vigo
International Workshop on Formal Aspects of Component Software, 188-204, 2012
432012
Broadcast, denial-of-service, and secure communication
R Vigo, F Nielson, HR Nielson
International Conference on Integrated Formal Methods, 412-427, 2013
412013
The cyber-physical attacker
R Vigo
International Conference on Computer Safety, Reliability, and Security, 347-356, 2012
212012
Smart grid security a smart meter-centric perspective
R Vigo, E Yuksel, C Ramli
Telecommunications Forum (TELFOR), 2012 20th, 127-130, 2012
172012
A framework for semi-automated process instance discovery from decorative attributes
A Burattin, R Vigo
2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM …, 2011
152011
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Nordic Conference on Secure IT Systems, 17-32, 2013
122013
Availability by Design-A Complementary Approach to Denial-of-Service
R Vigo, HR Nielson, F Nielson
Technical University of Denmark, Danmarks Tekniske Universitet, Department …, 2015
72015
Uniform protection for multi-exposed targets
R Vigo, F Nielson, HR Nielson
International Conference on Formal Techniques for Distributed Objects …, 2014
72014
A calculus of quality for robustness against unreliable communication
HR Nielson, F Nielson, R Vigo
Journal of Logical and Algebraic Methods in Programming 84 (5), 611-639, 2015
62015
Toward a threat model for energy-harvesting wireless sensor networks
A Di Mauro, D Papini, R Vigo, N Dragoni
International Conference on Networked Digital Technologies, 289-301, 2012
62012
Introducing the Cyber-Physical Attacker to Energy-Harvesting Wireless Sensor Networks
A Di Mauro, D Papini, R Vigo, N Dragoni
Journal of Networking Technology Volume 3 (3), 139, 2012
32012
Discovering, quantifying, and displaying attacks
R Vigo, F Nielson, HR Nielson
arXiv preprint arXiv:1607.07720, 2016
22016
Discovering, quantifying, and displaying attacks
HR Nielson, F Nielson, R Vigo
Logical Methods in Computer Science 12, 2017
12017
Trust-based Enforcement of Security Policies
R Vigo, A Celestini, F Tiezzi, R De Nicola, F Nielson, HR Nielson
International Symposium on Trustworthy Global Computing, 176-191, 2014
12014
Expressive power of definite clauses for verifying authenticity
G Filé, R Vigo
2009 22nd IEEE Computer Security Foundations Symposium, 251-265, 2009
12009
A calculus of quality for robustness against unreliable communication-DTU Orbit (11/01/2016)
HR Nielson, F Nielson, R Vigo
2015
Availability by Design
R Vigo, F Nielson, HR Nielson
Secure IT Systems 8788, 277-278, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20