Parametric probabilistic transition systems for system design and analysis R Lanotte, A Maggiolo-Schettini, A Troina Formal Aspects of Computing 19, 93-109, 2007 | 101 | 2007 |

A formal approach to cyber-physical attacks R Lanotte, M Merro, R Muradore, L Viganò 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017 | 63 | 2017 |

A formal approach to physics-based attacks in cyber-physical systems R Lanotte, M Merro, A Munteanu, L Viganò ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-41, 2020 | 52 | 2020 |

A semantic theory of the Internet of Things R Lanotte, M Merro Information and Computation 259, 72-101, 2018 | 50 | 2018 |

Probabilistic bisimulation as a congruence R Lanotte, S Tini ACM Transactions on Computational Logic (TOCL) 10 (2), 1-48, 2009 | 38 | 2009 |

A calculus of cyber-physical systems R Lanotte, M Merro Language and Automata Theory and Applications: 11th International Conference …, 2017 | 35 | 2017 |

Design and verification of long-running transactions in a timed framework R Lanotte, A Maggiolo-Schettini, P Milazzo, A Troina Science of Computer Programming 73 (2-3), 76-94, 2008 | 32 | 2008 |

Weak bisimulation for probabilistic timed automata and applications to security R Lanotte, A Maggiolo-Schettini, A Troina First International Conference onSoftware Engineering and Formal Methods …, 2003 | 30 | 2003 |

A probabilistic calculus of cyber-physical systems R Lanotte, M Merro, S Tini Information and Computation 279, 104618, 2021 | 29 | 2021 |

Semantic analysis of gossip protocols for wireless sensor networks R Lanotte, M Merro International Conference on Concurrency Theory, 156-170, 2011 | 28 | 2011 |

Taylor approximation for hybrid systems R Lanotte, S Tini Hybrid Systems: Computation and Control: 8th International Workshop, HSCC …, 2005 | 27 | 2005 |

Formal models of timing attacks on web privacy R Focardi, R Gorrieri, R Lanotte, A Maggiolo-Schettini, F Martinelli, S Tini, ... Electronic Notes in Theoretical Computer Science 62, 229-243, 2002 | 26 | 2002 |

Timed cooperating automata R Lanotte, A Maggiolo-Schettini, A Peron Fundamenta Informaticae 43 (1-4), 153-173, 2000 | 26 | 2000 |

Towards a formal notion of impact metric for cyber-physical attacks R Lanotte, M Merro, S Tini Integrated Formal Methods: 14th International Conference, IFM 2018, Maynooth …, 2018 | 25 | 2018 |

Modeling long–running transactions with communicating hierarchical timed automata R Lanotte, A Maggiolo-Schettini, P Milazzo, A Troina Formal Methods for Open Object-Based Distributed Systems: 8th IFIP WG 6.1 …, 2006 | 25 | 2006 |

Automatic analysis of a non-repudiation protocol R Lanotte, A Maggiolo-Schettini, A Troina Electronic Notes in Theoretical Computer Science 112, 113-129, 2005 | 25 | 2005 |

Distributed time-asynchronous automata C Dima, R Lanotte International Colloquium on Theoretical Aspects of Computing, 185-200, 2007 | 24 | 2007 |

Runtime enforcement for control system security R Lanotte, M Merro, A Munteanu 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 246-261, 2020 | 19 | 2020 |

A semantic theory of the internet of things R Lanotte, M Merro Coordination Models and Languages: 18th IFIP WG 6.1 International Conference …, 2016 | 19 | 2016 |

Time and probability-based information flow analysis R Lanotte, A Maggiolo-Schettini, A Troina IEEE Transactions on Software Engineering 36 (5), 719-734, 2010 | 19 | 2010 |