Roberto Vigo
Roberto Vigo
(former) PhD student, Technical University of Denmark
Verified email at - Homepage
Cited by
Cited by
Process mining manifesto
W Van Der Aalst, A Adriansyah, AKA De Medeiros, F Arcieri, T Baier, ...
Business Process Management Workshops: BPM 2011 International Workshops …, 2012
Automated generation of attack trees
R Vigo, F Nielson, HR Nielson
2014 IEEE 27th computer security foundations symposium, 337-350, 2014
A calculus for attribute-based communication
YA Alrahman, R De Nicola, M Loreti, F Tiezzi, R Vigo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1840-1845, 2015
A calculus for quality
HR Nielson, F Nielson, R Vigo
Formal Aspects of Component Software: 9th International Symposium, FACS 2012 …, 2013
Broadcast, denial-of-service, and secure communication
R Vigo, F Nielson, HR Nielson
Integrated Formal Methods: 10th International Conference, IFM 2013, Turku …, 2013
The cyber-physical attacker
R Vigo
Computer Safety, Reliability, and Security: SAFECOMP 2012 Workshops: Sassur …, 2012
A framework for semi-automated process instance discovery from decorative attributes
A Burattin, R Vigo
2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM …, 2011
Smart grid security a smart meter-centric perspective
R Vigo, E Yuksel, C Ramli
Telecommunications Forum (TELFOR), 2012 20th, 127-130, 2012
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
A calculus of quality for robustness against unreliable communication
HR Nielson, F Nielson, R Vigo
Journal of Logical and Algebraic Methods in Programming 84 (5), 611-639, 2015
Availability by Design-A Complementary Approach to Denial-of-Service
R Vigo, HR Nielson, F Nielson
Technical University of Denmark, Danmarks Tekniske Universitet, Department …, 2015
Uniform protection for multi-exposed targets
R Vigo, F Nielson, HR Nielson
Formal Techniques for Distributed Objects, Components, and Systems: 34th …, 2014
Toward a threat model for energy-harvesting wireless sensor networks
A Di Mauro, D Papini, R Vigo, N Dragoni
Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012
Discovering, quantifying, and displaying attacks
R Vigo, F Nielson, HR Nielson
Logical Methods in Computer Science 12, 2017
Trust-Based Enforcement of Security Policies
R Vigo, A Celestini, F Tiezzi, R De Nicola, F Nielson, HR Nielson
Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome …, 2014
Introducing the Cyber-Physical Attacker to Energy-Harvesting Wireless Sensor Networks
A Di Mauro, D Papini, R Vigo, N Dragoni
Journal of Networking Technology Volume 3 (3), 139, 2012
Availability by Design
R Vigo, F Nielson, HR Nielson
Secure IT Systems 8788, 277-278, 2014
Expressive power of definite clauses for verifying authenticity
G Filé, R Vigo
2009 22nd IEEE Computer Security Foundations Symposium, 251-265, 2009
A calculus of quality for robustness against unreliable communication-DTU Orbit (11/01/2016)
HR Nielson, F Nielson, R Vigo
The system can't perform the operation now. Try again later.
Articles 1–19