Roberto Vigo
Roberto Vigo
(former) PhD student, Technical University of Denmark
Verified email at imm.dtu.dk - Homepage
Title
Cited by
Cited by
Year
Process mining manifesto
W Van Der Aalst, A Adriansyah, AKA De Medeiros, F Arcieri, T Baier, ...
International Conference on Business Process Management, 169-194, 2011
8502011
Automated generation of attack trees
R Vigo, F Nielson, HR Nielson
2014 IEEE 27th Computer Security Foundations Symposium, 337-350, 2014
582014
A calculus for quality
HR Nielson, F Nielson, R Vigo
International Workshop on Formal Aspects of Component Software, 188-204, 2012
412012
Broadcast, denial-of-service, and secure communication
R Vigo, F Nielson, HR Nielson
International Conference on Integrated Formal Methods, 412-427, 2013
392013
A calculus for attribute-based communication
YA Alrahman, R De Nicola, M Loreti, F Tiezzi, R Vigo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1840-1845, 2015
352015
The cyber-physical attacker
R Vigo
International Conference on Computer Safety, Reliability, and Security, 347-356, 2012
182012
Smart grid security a smart meter-centric perspective
R Vigo, E Yuksel, C Ramli
Telecommunications Forum (TELFOR), 2012 20th, 127-130, 2012
152012
A framework for semi-automated process instance discovery from decorative attributes
A Burattin, R Vigo
2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM …, 2011
132011
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Nordic Conference on Secure IT Systems, 17-32, 2013
102013
Toward a threat model for energy-harvesting wireless sensor networks
A Di Mauro, D Papini, R Vigo, N Dragoni
International Conference on Networked Digital Technologies, 289-301, 2012
72012
Process mining manifesto
A Adriansyah, AKA de Medeiros, F Arcieri, T Baier, F Daniel, K Barkaoui, ...
LNBIP 99, 169-194, 2012
72012
Uniform protection for multi-exposed targets
R Vigo, F Nielson, HR Nielson
International Conference on Formal Techniques for Distributed Objects …, 2014
62014
Availability by Design-A Complementary Approach to Denial-of-Service
R Vigo, HR Nielson, F Nielson
Technical University of Denmark, Danmarks Tekniske Universitet, Department …, 2015
52015
A calculus of quality for robustness against unreliable communication
HR Nielson, F Nielson, R Vigo
Journal of Logical and Algebraic Methods in Programming 84 (5), 611-639, 2015
42015
Discovering, quantifying, and displaying attacks
R Vigo, F Nielson, HR Nielson
arXiv preprint arXiv:1607.07720, 2016
32016
Introducing the Cyber-Physical Attacker to Energy-Harvesting Wireless Sensor Networks
A Di Mauro, D Papini, R Vigo, N Dragoni
Journal of Networking Technology Volume 3 (3), 139, 2012
32012
Trust-based Enforcement of Security Policies
R Vigo, A Celestini, F Tiezzi, R De Nicola, F Nielson, HR Nielson
International Symposium on Trustworthy Global Computing, 176-191, 2014
22014
Availability by Design
R Vigo, F Nielson, HR Nielson
Secure IT Systems 8788, 277-278, 2014
12014
Expressive power of definite clauses for verifying authenticity
G Filé, R Vigo
2009 22nd IEEE Computer Security Foundations Symposium, 251-265, 2009
12009
A calculus of quality for robustness against unreliable communication-DTU Orbit (11/01/2016)
HR Nielson, F Nielson, R Vigo
2015
The system can't perform the operation now. Try again later.
Articles 1–20