| Efficient and robust pseudonymous authentication in VANET G Calandriello, P Papadimitratos, JP Hubaux, A Lioy Proceedings of the fourth ACM international workshop on Vehicular ad hoc …, 2007 | 775 | 2007 |
| On the performance of secure vehicular communication systems G Calandriello, P Papadimitratos, JP Hubaux, A Lioy IEEE transactions on dependable and secure computing 8 (6), 898-912, 2010 | 136 | 2010 |
| Integrity verification of Docker containers for a lightweight cloud environment M De Benedictis, A Lioy Future generation computer systems 97, 236-246, 2019 | 105 | 2019 |
| Dependability in wireless networks: Can we rely on WiFi? MD Aime, G Calandriello, A Lioy IEEE Security & Privacy 5 (1), 23-29, 2007 | 88 | 2007 |
| Adding support for automatic enforcement of security policies in NFV networks C Basile, F Valenza, A Lioy, DR Lopez, AP Perales IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019 | 82 | 2019 |
| Detection of encrypted cryptomining malware connections with machine and deep learning A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ... IEEE Access 8, 158036-158055, 2020 | 77 | 2020 |
| Impact of vehicular communications security on transportation safety P Papadimitratos, G Calandriello, JP Hubaux, A Lioy IEEE INFOCOM Workshops 2008, 1-6, 2008 | 77 | 2008 |
| Virtualized security at the network edge: A user-centric approach D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ... IEEE Communications Magazine 53 (4), 176-186, 2015 | 72 | 2015 |
| Diagnosis oriented test pattern generation P Camurati, A Lioy, P Prinetto, MS Reorda Proceedings of the European Design Automation Conference, 470-474, 1990 | 70 | 1990 |
| A novel approach for integrating security policy enforcement with dynamic network virtualization C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 67 | 2015 |
| Network-level access control policy analysis and transformation C Basile, A Cappadonia, A Lioy IEEE/ACM Transactions On Networking 20 (4), 985-998, 2011 | 60 | 2011 |
| Why to adopt a security metric? A brief survey A Atzeni, A Lioy Quality of Protection: Security Measurements and Metrics, 1-12, 2006 | 56 | 2006 |
| Advanced fault collapsing A Lioy IEEE Design & Test of Computers 9 (1), 64-71, 1992 | 54 | 1992 |
| Automatic synthesis of large telescopic units based on near-minimum timed supersetting L Benini, G De Micheli, A Lioy, E Macii, G Odasso, M Poncino IEEE Transactions on Computers 48 (8), 769-779, 2002 | 51 | 2002 |
| Classification and analysis of communication protection policy anomalies F Valenza, C Basile, D Canavese, A Lioy IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017 | 47 | 2017 |
| Cybersecurity in ICT supply chains: key challenges and a relevant architecture X Masip-Bruin, E Marín-Tordera, J Ruiz, A Jukan, P Trakadas, A Cernivec, ... Sensors 21 (18), 6057, 2021 | 45 | 2021 |
| PKI past, present and future A Lioy, M Marian, N Moltchanova, M Pala International Journal of Information Security 5 (1), 18-29, 2006 | 45 | 2006 |
| Providing login and Wi-Fi access services with the eIDAS network: A practical approach DG Berbecaru, A Lioy, C Cameroni IEEE Access 8, 126186-126200, 2020 | 44 | 2020 |
| A complexity analysis of sequential ATPG A Lioy, PL Montessoro, S Gai IEEE International Symposium on Circuits and Systems,, 1946-1949, 1989 | 44 | 1989 |
| Security issues in control, management and routing protocols M Baltatu, A Lioy, F Maino, D Mazzocchi Computer Networks 34 (6), 881-894, 2000 | 43 | 2000 |