Towards security as a service (secaas): On the modeling of security services for cloud computing A Furfaro, A Garro, A Tundis 2014 international carnahan conference on security technology (ICCST), 1-6, 2014 | 61 | 2014 |
A review of network vulnerabilities scanning tools: Types, capabilities and functioning A Tundis, W Mazurczyk, M Mühlhäuser Proceedings of the 13th international conference on availability …, 2018 | 51 | 2018 |
On the reliability analysis of systems and SoS: The RAMSAS method and related extensions A Garro, A Tundis IEEE Systems Journal 9 (1), 232-241, 2014 | 46 | 2014 |
Formal requirements modeling for simulation-based verification M Otter, N Thuy, D Bouskela, L Buffoni, H Elmqvist, P Fritzson, A Garro, ... | 45 | 2015 |
A model-based method for system reliability analysis. A Garro, A Tundis SpringSim (TMS-DEVS), 2, 2012 | 42 | 2012 |
Intelligent agents: Multi-agent systems A Garro, M Mühlhäuser, A Tundis, M Baldoni, C Baroglio, F Bergenti, ... Encyclopedia of Bioinformatics and Computational Biology: ABC of …, 2018 | 36 | 2018 |
Detecting and tracking criminals in the real world through an IoT-based system A Tundis, H Kaleem, M Mühlhäuser Sensors 20 (13), 3795, 2020 | 35 | 2020 |
Formal requirements modeling for cyber-physical systems engineering: An integrated solution based on FORM-L and Modelica D Bouskela, A Falcone, A Garro, A Jardin, M Otter, N Thuy, A Tundis Requirements Engineering 27 (1), 1-30, 2022 | 34 | 2022 |
On the automated assessment of open-source cyber threat intelligence sources A Tundis, S Ruppert, M Mühlhäuser Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 33 | 2020 |
Reliability analysis of an attitude determination and control system (ADCS) through the RAMSAS method A Garro, J Groß, A Tundis Journal of Computational Science 5 (3), 439-449, 2014 | 30 | 2014 |
On formal cyber physical system properties modeling: A new temporal logic language and a Modelica-based solution A Garro, A Tundis, D Bouskela, A Jardin, N Thuy, M Otter, L Buffoni, ... 2016 IEEE International Symposium on Systems Engineering (ISSE), 1-8, 2016 | 28 | 2016 |
A feature-based model for the identification of electrical devices in smart environments A Tundis, A Faizan, M Mühlhäuser Sensors 19 (11), 2611, 2019 | 27 | 2019 |
Modeling system requirements in modelica: definition and comparison of candidate approaches A Tundis, L Rogovchenko-Buffoni, P Fritzson, A Garro 5th International Workshop on Equation-Based Object-Oriented Modelling …, 2013 | 23 | 2013 |
Modeling and simulation for system reliability analysis: The RAMSAS method A Garro, A Tundis 2012 7th International Conference on System of Systems Engineering (SoSE …, 2012 | 23 | 2012 |
A multi-language approach towards the identification of suspicious users on social networks A Tundis, M Mühlhäuser 2017 International Carnahan Conference on Security Technology (ICCST), 1-6, 2017 | 22 | 2017 |
An integrated toolchain for model based functional safety analysis L Rogovchenko-Buffoni, A Tundis, MZ Hossain, M Nyberg, P Fritzson Journal of Computational Science 5 (3), 408-414, 2014 | 21 | 2014 |
Supporting the identification and the assessment of suspicious users on twitter social media A Tundis, G Bhatia, A Jain, M Mühlhäuser 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 19 | 2018 |
Requirements specification of a cloud service for cyber security compliance analysis A Furfaro, T Gallo, A Garro, D Sacca, A Tundis 2016 2nd International Conference on Cloud Computing Technologies and …, 2016 | 19 | 2016 |
A feature-driven method for automating the assessment of osint cyber threat sources A Tundis, S Ruppert, M Mühlhäuser Computers & Security 113, 102576, 2022 | 18 | 2022 |
Similarity analysis of criminals on social networks: An example on Twitter A Tundis, A Jain, G Bhatia, M Muhlhauser 2019 28th International Conference on Computer Communication and Networks …, 2019 | 18 | 2019 |