Bounded memory Dolev-Yao adversaries in collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Information and computation, Special issue on Security and Rewriting …, 2014 | 26 | 2014 |
Time, computational complexity, and probability in the analysis of distance-bounding protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Journal of Computer Security 25 (6), 585-630, 2017 | 25 | 2017 |
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott 4th Conference on Principles of Security and Trust (POST), Springer LNCS …, 2015 | 24 | 2015 |
A rewriting framework and logic for activities subject to regulations M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic Mathematical Structures in Computer Science, 2015 | 21 | 2015 |
A Rewriting Framework for Activities Subject to Regulations. MI Kanovich, T Ban Kirigin, V Nigam, A Scedrov, CL Talcott, R Perovic RTA 15, 305-322, 2012 | 21 | 2012 |
Resource-bounded intruders in denial of service attacks AA Urquiza, MA AlTurki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, ... 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 382-38214, 2019 | 20 | 2019 |
Timed multiset rewriting and the verification of time-sensitive distributed systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott International Conference on Formal Modeling and Analysis of Timed Systems …, 2016 | 19 | 2016 |
Bounded memory protocols and progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Computer Security–ESORICS 2013, Springer LNCS 8134, 309-326, 2013 | 15 | 2013 |
Lexical sense labeling and sentiment potential analysis using corpus-based dependency graph T Ban Kirigin, S Bujačić Babić, B Perak Mathematics 9 (12), 1449, 2021 | 12 | 2021 |
Statistical model checking of distance fraud attacks on the Hancke-Kuhn family of protocols MA Alturki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018 | 12 | 2018 |
Towards Timed Models for Cyber-Physical Security Protocols M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Joint Workshop on Foundations of Computer Security and Formal and …, 2014 | 12 | 2014 |
Bounded memory Dolev-Yao adversaries in collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Formal Aspects of Security and Trust, 18-33, 2011 | 11 | 2011 |
On the Complexity of Verification of Time-Sensitive Distributed Systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott Protocols, Strands, and Logic, 251-275, 2021 | 10 | 2021 |
Resource and timing aspects of security protocols A Aires Urquiza, MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, ... Journal of computer security 29 (3), 299-340, 2021 | 10 | 2021 |
A multiset rewriting model for specifying and verifying timing aspects of security protocols MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott Foundations of Security, Protocols, and Equational Reasoning, 192-213, 2019 | 10 | 2019 |
Semi-Local Integration Measure of Node Importance T Ban Kirigin, S Bujačić Babić, B Perak Mathematics 10 (3), 1-16, 2022 | 9 | 2022 |
Progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Advances in computer science: an international journal 3 (3), 78-86, 2014 | 9* | 2014 |
Towards an automated assistant for clinical investigations V Nigam, T Ban Kirigin, A Scedrov, C Talcott, M Kanovich, R Perovic Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 9 | 2012 |
Progressing collaborative systems M Kanovich, T Ban Kirigin, V Nigam, A Scedrov Workshop on Foundations of Security and Privacy (FCS-PrivMod 2010), 2010 | 9 | 2010 |
On the formalization and computational complexity of resilience problems for cyber-physical systems MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott International Colloquium on Theoretical Aspects of Computing, 96-113, 2022 | 8 | 2022 |