• 1733 Citations
1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
Conference contribution

A compositional semantics for normal open programs

Etalle, S. & Teusink, F., 1996, Logic Programing (Proceedings of the 1996 Joint International Conference and Symposium on Logic Programming, Bonn, Germany, September 2-6, 1996). Mahler, M. J. (ed.). MIT Press, p. 468-482

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

Bolzoni, D., Schade, C. L. & Etalle, S., 2011, Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011). Usenix Association, p. 201-215

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A formally verified decentralized key management architecture for wireless sensor networks

Law, Y. W., Corin, R. J., Etalle, S. & Hartel, P. H., 2003, Personal Wireless Communications (Proceedings IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003). Conti, M., Giordano, S., Gregori, E. & Olariu, S. (eds.). Springer, p. 27-39 (Lecture Notes in Computer Science; vol. 2775).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

21 Citations (Scopus)

A formal security analysis of an OSA/Parlay authentication interface

Corin, R. J., Di Caprio, G., Etalle, S., Gnesi, S., Lenzini, G. & Moiso, C., 2005, Formal Methods for Open Object-Based Distributed Systems (Proceedings 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005). Steffen, M. & Zavattaro, G. (eds.). Springer, p. 131-146 (Lecture Notes in Computer Science; vol. 3535).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

15 Citations (Scopus)

A logic for auditing accountability in decentralized systems

Corin, R. J., Etalle, S., Hartog, den, J. I., Lenzini, G. & Staicu, I. S., 2005, Formal Aspects in Security and Trust (Proceedings IFIP TC1 WG1.7 Workshop, FAST, Toulouse, France, August 26-27, 2004). Dimitrakos, T. & Martinelli, F. (eds.). Boston: Springer, p. 187-201 15 p. (IFIP International Federation for Information Processing (IFIPAICT); vol. 173).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

A logic for constraint-based security protocol analysis

Corin, R. J., Etalle, S. & Saptawijaya, A., 2006, Proceedings 2006 IEEE Symposium on Security and Privacy (S&P 2006, Oakland CA, USA, May 21-24, 2006). IEEE Computer Society, p. 155-168

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)

A model supporting business continuity auditing and planning in information systems

Zambon, E., Bolzoni, D., Etalle, S. & Salvato, M., 2007, Proceedings of the 2nd International Conference on Internet Monitoring and Protection (ICIMP2007) 1 - 5 July 2007, San Jose, California, USA. Los Alamitos, California, USA: Institute of Electrical and Electronics Engineers, p. 33-33

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
3 Downloads (Pure)

Analysing password protocol security against off-line dictionary attacks

Corin, R. J., Etalle, S. & Doumen, J. M., 2005, Proceedings 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004, Bologna, Italy, June 26, 2004). p. 47-63 (Electronic Notes in Theoretical Computer Science; vol. 121).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)

An audit logic for accountability

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S. & Hartog, den, J. I., 2005, Policies for Distributed Systems and Networks 2006 (Proceedings 6th IEEE International Workshop, POLICY 2005, Stockholm, Sweden, June 6-8, 2005). IEEE Computer Society, p. 34-43

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

43 Citations (Scopus)

A new method to assess telecom service availability risks

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2011, Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011). Lisbon: Information Systems for Crisis Response and Management (ISCRAM), p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Citations (Scopus)
43 Downloads (Pure)

An improved constraint-based system for the verification of security protocols

Corin, R. J. & Etalle, S., 2002, Static analysis : proceedings 9th international symposium, SAS 2002, Madrid, Spain, September 17-20, 2002. Hermenegildo, M. V. & Puebla, G. (eds.). Springer, p. 326-341 (Lecture Notes in Computer Science; vol. 2477).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

43 Citations (Scopus)

An introduction to the role based trust management framework RT

Czenko, M., Etalle, S., Li, D. & Winsborough, W. H., 2007, Foundations of Security Analysis and Design IV (FOSAD 2006/2007 Tutorial Lectures). Aldini, A. & Gorrieri, R. (eds.). Berlin: Springer, p. 246-281 (Lecture Notes in Computer Science; vol. 4677).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
8 Citations (Scopus)
103 Downloads (Pure)

A posteriori compliance control

Etalle, S. & Winsborough, W. H., 2007, Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007) 20-22 June 2007, Sophia Antipolis, France. New York, New York: Association for Computing Machinery, Inc, p. 11-20

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

39 Citations (Scopus)
1 Downloads (Pure)

Approximating fair use in LicenseScript

Chong, C. N., Etalle, S., Hartel, P. H. & Law, Y. W., 2003, Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access (Proceedings 6th International Conference on Asian Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 8-12, 2003). Sembok, T. M. T., Zaman, H. B., Chen, H., Urs, S. R. & Myaeng, S. H. (eds.). Springer, p. 432-443 (Lecture Notes in Computer Science; vol. 2911).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2 Downloads (Pure)

A security framework for systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings 12th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2011, Pisa, Italy, June 6-8, 2011). IEEE Computer Society, p. 182-183

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
84 Downloads (Pure)

Assessing security in energy-efficient sensor networks

Law, Y. W., Etalle, S. & Hartel, P. H., 2003, Security and Privacy in the Age of Uncertainty (Proceedings IFIP TC11 18th International Conference on Information Security, SEC2003, Athens, Greece, May 26-28, 2003). Gritzalis, D., De Capitani di Vimercati, S., Samarati, P. & Katsikas, S. K. (eds.). Kluwer, p. 459-463 (IFIP Conference Proceedings; vol. 250).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A survey of network intrusion detection systems for controller area network

Dupont, G., den Hartog, J., Etalle, S. & Lekidis, A., Sep 2019, 2019 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2019. Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 8906465

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

ATLANTIDES : An architecture for alert verification in network intrusion detection systems

Bolzoni, D., Crispo, B. & Etalle, S., 2007, Proceedings of the 21st Large Installation System Administration Conference (LISA 2007), Dallas TX, USA, November 11-16, 2007. Usenix Association, p. 141-152

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Downloads (Pure)

A trace logic for local security properties

Corin, R. J., Etalle, S., Hartel, P. H. & Durante, A., 2005, Proceedings of the International Workshop on Software Verification and Validation (SVV 2003, Mumbai, India, December 14, 2003). p. 129-143 (Electronic Notes in Theoretical Computer Science; vol. 118).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A transformation system for CLP with dynamic scheduling and CCP

Etalle, S., Gabbrielli, M. & Marchiori, E., 1997, Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97, Amsterdam, The Netherlands, June 12-13, 1997). p. 137-150 (ACM Sigplan Notices; vol. 32(12)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

A transformation system for modular CLP programs

Etalle, S. & Gabbrielli, M., 1995, Logic Programming (Proceedings 12th International Conference on Logic Programming, Tokyo, Japan, June 13-16, 1995). Sterling, L. (ed.). MIT Press, p. 681-695

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Audit-based access control for electronic health records

Dekker, M. A. C. & Etalle, S., 2007, Proceedings 2nd International Workshop on Views on Designing Complex Architectures (VODCA), September 16-17, 2006, Bertinoro, Italy. p. 221-236 (Electronic Notes in Theoretical Computer Science; vol. 168).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

28 Citations (Scopus)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
55 Downloads (Pure)

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Beyond success and failure

Etalle, S. & Raamsdonk, van, F., 1998, Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming (Manchester, UK, June 15-19, 1998). Jaffar, J. (ed.). MIT Press, p. 190-205

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Boosting web intrusion detection systems by inferring positive signatures

Bolzoni, D. & Etalle, S., 2008, On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II. Meersman, R. & Tari, Z. (eds.). Berlin: Springer, p. 938-955 (Lecture Notes in Computer Science; vol. 5332).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., 2012, Proceedings of the IEEE Workshop on Complexity in Engineering (COMPENG'12, Aachen, Germany, June 11-13, 2012). Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 6242970

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, A., Wetzels, J., Holz, T. & Etalle, S., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 31-46 16 p. 8806725

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Comparing logic-based and XML-based rights expression languages

Chong, C. N., Etalle, S. & Hartel, P. H., 2003, On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops (Proceedings OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003). Meersman, R. & Tari, Z. (eds.). Springer, p. 779-792 (Lecture Notes in Computer Science; vol. 2889).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

Core TuLiP logic programming for trust management

Czenko, M. & Etalle, S., 2007, Proceedings of the 23rd International Conference on Logic Programming (ICLP 2007) 8-13 September 2007, Porto, Portugal. Dahl, V. & Niemelä, I. (eds.). Berlin, Germany: Springer, p. 380-394 (Lecture Notes in Computer Science; vol. 4670).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Citations (Scopus)
79 Downloads (Pure)

CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

Morali, A., Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010). Institute of Electrical and Electronics Engineers, p. 322-325

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2 Downloads (Pure)

Design and initial validation of the Raster method for telecom service availability risk assessment

Vriezekolk, E., Wieringa, R. & Etalle, S., 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Rothkrantz, L., Ristvej, J. & Franco, Z. (eds.). Vancouver: Simon Fraser University, p. 1-10

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, 4-8 December 2017, Orlando, Florida. New York: Association for Computing Machinery, Inc, p. 437-448 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
97 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 17 Apr 2018, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
3 Citations (Scopus)
4 Downloads (Pure)

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

Cappers, B. C. M., Meessen, P. N., Etalle, S. & Van Wijk, J. J., 9 May 2019, 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018. Trent, S., Kohlhammer, J., Sauer, G., Gove, R., Best, D., Paul, C. L., Prigent, N. & Staheli, D. (eds.). Institute of Electrical and Electronics Engineers, 8 p. 8709230

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
143 Downloads (Pure)

Experimental validation of a risk assessment method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 2015, Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings). Fricker, S. A. & Schneider, K. (eds.). Springer, p. 1-16 (Lecture Notes in Computer Science; vol. 9013).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Extended eTVRA vs. security checklist: Experiences in a value-web

Morali, A., Zambon, E., Houmb, S. H., Sallhammar, K. & Etalle, S., 2009, Proceedings 31st International Conference on Software Engineering (ICSE'09, Vancouver, Canada, May 16-24, 2009). IEEE Computer Society, p. 130-140

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Extended privilege inheritance in RBAC

Dekker, M. A. C., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007) 20-22 March 2007, Singapore. Bao, F. & Miller, S. (eds.). New York: Association for Computing Machinery, Inc, p. 383-385

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

EYES - Energy Efficient Sensor Networks

Havinga, P. J. M., Etalle, S., Karl, H., Petrioli, C., Zorzi, M., Kip, H. & Lentsch, T., 2003, Personal wireless communications : proceedings IFIP-TC6 8th international conference, PWC 2003, Venice, Italy, September 23-25, 2003. Conti, M., Giordano, S., Gregori, E. & Olariu, S. (eds.). Springer, p. 198-201 (Lecture Notes in Computer Science; vol. 2775).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

From intrusion detection to software design

Etalle, S., 11 Sep 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Gollmann, D. & Snekkens, E. (eds.). Springer, Vol. Part I. p. 1-10 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
9 Citations (Scopus)
96 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 3 Nov 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)
3 Downloads (Pure)

Guess what? here is a new tool that finds some new guessing attacks

Corlin, R., Sreekanth, M., Alves Foss, J. & Etalle, S., 2003, Workshop on Issues in the Theory of Security (WITS, part of European Joint Conferences on Theory and Practice of Software, ETAPS'2003, Warsaw, Poland, April 5-13, 2003). Gorrieri, R. & Lucchi, R. (eds.). p. 62-71

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract)

Corin, R. J., Malladi, S., Alves-Foss, J. & Etalle, S., 2003, Proceedings IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS'03, Warsaw, Poland, April 5-6, 2003). Dipartamento di Scienze dell'Informazione, Università di Bologna, p. 62-71

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

How to assess telecom service availability risks for crisis organisations?

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2012, Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011). Berenguer, C., Grall, A. & Guedes Soares, C. (eds.). CRC Press, p. 2653-2661

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
5 Downloads (Pure)

Integrity constraints in trust management

Etalle, S. & Winsborough, W. H., 2005, SACMAT 2005 (Proceedings 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005). Association for Computing Machinery, Inc, p. 1-10

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

IT confidentiality risk assessment for an architecture-based approach

Morali, A., Zambon, E., Etalle, S. & Overbeek, P. L., 2008, Proceedings 3rd IEEE/IFIP International Workshop on Business-driven IT Management (BDIM 2008, Salvador, Brazil, April 7, 2008). Bartolini, C., Sahai, A. & Sauvé, J. P. (eds.). Institute of Electrical and Electronics Engineers, p. 31-40

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (eds.). Berlin: Springer, p. 129-142 (Lecture Notes in Computer Science; vol. 5491).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)