| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | B | conf |
VMCAI
|
| 2026 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | B | conf |
Petri Nets
|
| 2025 | — | conf |
NordSec
|
| 2025 | A | conf |
RTSS
|
| 2025 | C | conf |
ICTAC
|
| 2025 | A | conf |
CSF
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
NordSec
|
| 2025 | J | jnl |
CoRR
|
| 2024 | A | conf |
AsiaCCS
|
| 2024 | J | jnl |
Proc. ACM Program. Lang.
|
| 2024 | — | conf |
VSTTE
|
| 2024 | A | conf |
CSF
|
| 2023 | J | jnl |
CoRR
|
| 2023 | B | conf |
FMCAD
|
| 2023 | J | jnl |
Proc. ACM Program. Lang.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Future Internet
|
| 2023 | J | jnl |
CoRR
|
| 2022 | — | conf |
The Logic of Software. A Tasting Menu of Formal Methods
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | B | conf |
FMCAD
|
| 2022 | B | conf |
FMCAD
|
| 2022 | — | conf |
EuroP4@CoNEXT
|
| 2022 | — | conf |
ESOCC
|
| 2022 | — | conf |
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing.
SEED
|
| 2021 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2021 | A | conf |
CSF
|
| 2021 | J | jnl |
Sci. Comput. Program.
|
| 2021 | B | conf |
FMCAD
|
| 2021 | A* | conf |
MICRO
|
| 2020 | — | conf |
ICE
|
| 2020 | C | conf |
COORDINATION
|
| 2020 | B | conf |
SEFM
|
| 2020 | A* | conf |
CCS
|
| 2020 | — | conf |
ISoLA (1)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
J. Bank. Financial Technol.
|
| 2020 | — | conf |
CAV (1)
|
| 2020 | J | jnl |
CoRR
|
| 2019 | C | conf |
COORDINATION
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Sci. Comput. Program.
|
| 2019 | Misc | conf |
ICISS
|
| 2018 | — | conf |
POST
|
| 2018 | — | conf |
NordSec
|
| 2018 | — | conf |
ICE
|
| 2018 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2018 | J | jnl |
CoRR
|
| 2017 | — | conf |
SBMF
|
| 2016 | — | conf |
ICE
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2016 | J | jnl |
J. Comput. Secur.
|
| 2015 | C | conf |
PST
|
| 2015 | — | conf |
TRUST
|
| 2015 | — | conf |
ESORICS (1)
|
| 2015 | B | conf |
SOFSEM
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
Business Process Management Workshops
|
| 2014 | C | conf |
PST
|
| 2013 | — | conf |
AIBP@AI*IA
|
| 2013 | A* | conf |
CCS
|
| 2013 | — | conf |
TrustED@CCS
|
| 2011 | — | conf |
WS-FM
|
| 2011 | — | ch. |
Results of the SENSORIA Project
|
| 2010 | A | conf |
ICSOC
|
| 2010 | J | jnl |
Sci. Comput. Program.
|
| 2010 | — | conf |
TGC
|
| 2008 | C | conf |
FORTE
|
| 2008 | J | jnl |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
|
| 2008 | — | conf |
Concurrency, Graphs and Models
|
| 2008 | — | conf |
FACS
|
| 2008 | — | conf |
WS-FM
|
| 2007 | C | conf |
FORTE
|
| 2006 | A | conf |
ICSOC
|
| 2006 | C | conf |
FORTE
|