Parametric probabilistic transition systems for system design and analysis R Lanotte, A Maggiolo-Schettini, A Troina Formal Aspects of Computing 19 (1), 93-109, 2007 | 90 | 2007 |

A semantic theory of the Internet of Things R Lanotte, M Merro Information and Computation 259, 72-101, 2018 | 55 | 2018 |

A formal approach to cyber-physical attacks R Lanotte, M Merro, R Muradore, L Viganò 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017 | 54 | 2017 |

Probabilistic bisimulation as a congruence R Lanotte, S Tini ACM Transactions on Computational Logic (TOCL) 10 (2), 1-48, 2009 | 34 | 2009 |

Design and verification of long-running transactions in a timed framework R Lanotte, A Maggiolo-Schettini, P Milazzo, A Troina Science of Computer Programming 73 (2-3), 76-94, 2008 | 33 | 2008 |

A formal approach to physics-based attacks in cyber-physical systems R Lanotte, M Merro, A Munteanu, L Viganò ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-41, 2020 | 30 | 2020 |

Weak bisimulation for probabilistic timed automata and applications to security R Lanotte, A Maggiolo-Schettini, A Troina First International Conference onSoftware Engineering and Formal Methods …, 2003 | 30 | 2003 |

A calculus of cyber-physical systems R Lanotte, M Merro International Conference on Language and Automata Theory and Applications …, 2017 | 28 | 2017 |

Semantic analysis of gossip protocols for wireless sensor networks R Lanotte, M Merro International Conference on Concurrency Theory, 156-170, 2011 | 28 | 2011 |

Taylor approximation for hybrid systems R Lanotte, S Tini International Workshop on Hybrid Systems: Computation and Control, 402-416, 2005 | 26 | 2005 |

Distributed time-asynchronous automata C Dima, R Lanotte International Colloquium on Theoretical Aspects of Computing, 185-200, 2007 | 25 | 2007 |

Modeling long–running transactions with communicating hierarchical timed automata R Lanotte, A Maggiolo-Schettini, P Milazzo, A Troina International Conference on Formal Methods for Open Object-Based Distributed …, 2006 | 25 | 2006 |

Formal models of timing attacks on web privacy R Focardi, R Gorrieri, R Lanotte, A Maggiolo-Schettini, F Martinelli, S Tini, ... Electronic Notes in Theoretical Computer Science 62, 229-243, 2002 | 25 | 2002 |

Timed cooperating automata R Lanotte, A Maggiolo-Schettini, A Peron Fundamenta Informaticae 43 (1-4), 153-173, 2000 | 25 | 2000 |

Automatic analysis of a non-repudiation protocol R Lanotte, A Maggiolo-Schettini, A Troina Electronic Notes in Theoretical Computer Science 112, 113-129, 2005 | 24 | 2005 |

Towards a formal notion of impact metric for cyber-physical attacks R Lanotte, M Merro, S Tini International Conference on Integrated Formal Methods, 296-315, 2018 | 22 | 2018 |

A probabilistic calculus of cyber-physical systems R Lanotte, M Merro, S Tini Information and Computation 279, 104618, 2021 | 21 | 2021 |

Time and probability-based information flow analysis R Lanotte, A Maggiolo-Schettini, A Troina IEEE Transactions on Software Engineering 36 (5), 719-734, 2010 | 20 | 2010 |

Security policies enforcement using finite edit automata D Beauquier, J Cohen, R Lanotte Electronic Notes in Theoretical Computer Science 229 (3), 19-35, 2009 | 19 | 2009 |

Probabilistic congruence for semistochastic generative processes R Lanotte, S Tini International Conference on Foundations of Software Science and Computation …, 2005 | 18 | 2005 |