Bounded memory Dolev-Yao adversaries in collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Information and computation, Special issue on Security and Rewriting …, 2014 | 25 | 2014 |
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott 4th Conference on Principles of Security and Trust (POST), Springer LNCS …, 2015 | 22 | 2015 |
Time, computational complexity, and probability in the analysis of distance-bounding protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Journal of Computer Security 25 (6), 585-630, 2017 | 20 | 2017 |
A Rewriting Framework for Activities Subject to Regulations. MI Kanovich, T Ban Kirigin, V Nigam, A Scedrov, CL Talcott, R Perovic RTA 15, 305-322, 2012 | 20 | 2012 |
Resource-bounded intruders in denial of service attacks AA Urquiza, MA AlTurki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, ... 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 382-38214, 2019 | 17 | 2019 |
A rewriting framework and logic for activities subject to regulations M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic Mathematical Structures in Computer Science, 2015 | 16 | 2015 |
Bounded memory protocols and progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Computer Security–ESORICS 2013, Springer LNCS 8134, 309-326, 2013 | 14 | 2013 |
Timed multiset rewriting and the verification of time-sensitive distributed systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott International Conference on Formal Modeling and Analysis of Timed Systems …, 2016 | 13 | 2016 |
Lexical sense labeling and sentiment potential analysis using corpus-based dependency graph T Ban Kirigin, S Bujačić Babić, B Perak Mathematics 9 (12), 1449, 2021 | 12 | 2021 |
Statistical model checking of distance fraud attacks on the Hancke-Kuhn family of protocols MA Alturki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018 | 11 | 2018 |
Towards Timed Models for Cyber-Physical Security Protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Joint Workshop on Foundations of Computer Security and Formal and …, 2014 | 11 | 2014 |
Bounded memory Dolev-Yao adversaries in collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Formal Aspects of Security and Trust, 18-33, 2011 | 11 | 2011 |
A multiset rewriting model for specifying and verifying timing aspects of security protocols MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott Foundations of Security, Protocols, and Equational Reasoning, 192-213, 2019 | 9 | 2019 |
Progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Advances in computer science: an international journal 3 (3), 78-86, 2014 | 9* | 2014 |
Towards an automated assistant for clinical investigations V Nigam, T Ban Kirigin, A Scedrov, C Talcott, M Kanovich, R Perovic Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 9 | 2012 |
Progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Workshop on Foundations of Security and Privacy (FCS-PrivMod 2010), 2010 | 9 | 2010 |
Resource and timing aspects of security protocols A Aires Urquiza, MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, ... Journal of Computer Security 29 (3), 299-340, 2021 | 8 | 2021 |
Corpus-Based Syntactic-Semantic Graph Analysis: Semantic Domains of the Concept Feeling B Perak, T Ban Kirigin Rasprave: Časopis Instituta za hrvatski jezik i jezikoslovlje 46 (2), 957-996, 2020 | 8 | 2020 |
Towards a formal model of language networks T Ban Kirigin, A Meštrović, S Martinčić-Ipšić International Conference on Information and Software Technologies, 469-479, 2015 | 8 | 2015 |
Compliance in real time multiset rewriting models M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott arXiv preprint arXiv:1811.04826, 2018 | 6 | 2018 |