Defense trees for economic evaluation of security investments S Bistarelli, F Fioravanti, P Peretti First International Conference on Availability, Reliability and Security …, 2006 | 238 | 2006 |

VeriMAP: A tool for verifying programs through transformations ED Angelis, F Fioravanti, A Pettorossi, M Proietti International Conference on Tools and Algorithms for the Construction and …, 2014 | 83 | 2014 |

Verifying CTL properties of infinite state systems by specializing constraint logic programs F Fioravanti, A Pettorossi, M Proietti | 60 | 2001 |

Semantics-based generation of verification conditions by program specialization E De Angelis, F Fioravanti, A Pettorossi, M Proietti Proceedings of the 17th International Symposium on Principles and Practice …, 2015 | 56 | 2015 |

Generalization strategies for the verification of infinite state systems F Fioravanti, A Pettorossi, M Proietti, V Senni Theory and Practice of Logic Programming 13 (2), 175-199, 2013 | 55 | 2013 |

Using CP-nets as a guide for countermeasure selection S Bistarelli, F Fioravanti, P Peretti Proceedings of the 2007 ACM symposium on Applied computing, 300-304, 2007 | 48 | 2007 |

Transformation rules for locally stratified constraint logic programs F Fioravanti, A Pettorossi, M Proietti Program Development in Computational Logic, 291-339, 2004 | 48 | 2004 |

Program verification via iterated specialization E De Angelis, F Fioravanti, A Pettorossi, M Proietti Science of Computer Programming 95, 149-175, 2014 | 46 | 2014 |

Relational verification through horn clause transformation ED Angelis, F Fioravanti, A Pettorossi, M Proietti International Static Analysis Symposium, 147-169, 2016 | 37 | 2016 |

Generation of test data structures using constraint logic programming V Senni, F Fioravanti International Conference on Tests and Proofs, 115-131, 2012 | 26 | 2012 |

Automated strategies for specializing constraint logic programs F Fioravanti, M Proietti, A Pettorossi International Workshop on Logic-Based Program Synthesis and Transformation …, 2000 | 26 | 2000 |

Proving correctness of imperative programs by linearizing constrained Horn clauses E De Angelis, F Fioravanti, A Pettorossi, M Proietti Theory and Practice of Logic Programming 15 (4-5), 635-650, 2015 | 24 | 2015 |

Evaluation of complex security scenarios using defense trees and economic indexes S Bistarelli, F Fioravanti, P Peretti, F Santini Journal of Experimental & Theoretical Artificial Intelligence 24 (2), 161-192, 2012 | 24 | 2012 |

A layered IT infrastructure for secure interoperability in Personal Data Registry digital government services F Arcieri, F Fioravanti, E Nardelli, M Talamo 14th International Workshop Research Issues on Data Engineering: Web …, 2004 | 22 | 2004 |

Solving Horn clauses on inductive data types without induction E De Angelis, F Fioravanti, A Pettorossi, M Proietti Theory and Practice of Logic Programming 18 (3-4), 452-469, 2018 | 21 | 2018 |

Verifying programs via iterated specialization E De Angelis, F Fioravanti, A Pettorossi, M Proietti Proceedings of the ACM SIGPLAN 2013 workshop on Partial evaluation and …, 2013 | 20 | 2013 |

Verifying array programs by transforming verification conditions ED Angelis, F Fioravanti, A Pettorossi, M Proietti International Conference on Verification, Model Checking, and Abstract …, 2014 | 19 | 2014 |

Program specialization for verifying infinite state systems: An experimental evaluation F Fioravanti, A Pettorossi, M Proietti, V Senni International Symposium on Logic-Based Program Synthesis and Transformation …, 2010 | 18 | 2010 |

Identity management for e-government services F Fioravanti, E Nardelli Digital government, 331-352, 2008 | 16 | 2008 |

Verification of sets of infinite state processes using program transformation F Fioravanti, A Pettorossi, M Proietti International Workshop on Logic-based Program Synthesis and Transformation …, 2001 | 16 | 2001 |