default search action
Stylianos Basagiannis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Stylianos Basagiannis, Ludovico Battista, Anna Becchi, Alessandro Cimatti, Georgios Giantamidis, Sergio Mover, Alberto Tacchella, Stefano Tonetta, Vassilios A. Tsachouridis:
SMT-Based Stability Verification of an Industrial Switched PI Control Systems. DSN-W 2023: 243-250 - 2021
- [j13]Joseba Andoni Agirre, Leire Etxeberria, Raul Barbosa, Stylianos Basagiannis, Georgios Giantamidis, Thomas Bauer, Enrico Ferrari, Mikel Labayen Esnaola, Vanessa Orani, Johnny Öberg, David Pereira, José Proença, Rupert Schlick, Ales Smrcka, Walter Tiberti, Stefano Tonetta, Marco Bozzano, Ahmet Yazici, Behrooz Sangchoolie:
The VALU3S ECSEL project: Verification and validation of automated systems safety and security. Microprocess. Microsystems 87: 104349 (2021) - [j12]Georgios Giantamidis, Stavros Tripakis, Stylianos Basagiannis:
Learning Moore machines from input-output traces. Int. J. Softw. Tools Technol. Transf. 23(1): 1-29 (2021) - 2020
- [j11]Stylianos Basagiannis, Anila Mjeda, Götz Botterweck:
Second Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2020 Workshop (InterAVT 2020). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 79 (2020) - [j10]Georgios Giantamidis, Georgios Papanikolaou, Marcelo Miranda, Gonzalo Salinas-Hernando, Juan Valverde-Alcalá, Suresh Veluru, Stylianos Basagiannis:
ReForm: A Tool for Rapid Requirements Formalization. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 79 (2020) - [c21]Raul Barbosa, Stylianos Basagiannis, Georgios Giantamidis, H. Becker, Enrico Ferrari, J. Jahic, A. Kanak, Mikel Labayen Esnaola, Vanessa Orani, David Pereira, Luigi Pomante, Rupert Schlick, Ales Smrcka, Ahmet Yazici, Peter Folkesson, Behrooz Sangchoolie:
The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security. DSD 2020: 352-359 - [c20]Riccardo Orizio, Satyanarayana Vuppala, Stylianos Basagiannis, Gregory M. Provan:
Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning. IDSTA 2020: 42-49 - [c19]Georgios Giantamidis, Stylianos Basagiannis, Stavros Tripakis:
Efficient Translation of Safety LTL to DFA Using Symbolic Automata Learning and Inductive Inference. SAFECOMP 2020: 115-129
2010 – 2019
- 2019
- [j9]Anila Mjeda, Stylianos Basagiannis, Goetz Botterweck:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 77 (2019) - [c18]Stylianos Basagiannis, Panagiotis Katsaros:
Formal Verification of Network Interlocking Control by Distributed Signal Boxes. IMBSA 2019: 204-221 - 2018
- [j8]Sophia G. Petridou, Stylianos Basagiannis, Lefteris Mamatas:
Formal Methods for Energy-Efficient EPONs. IEEE Trans. Green Commun. Netw. 2(1): 246-259 (2018) - [c17]Luís Diogo Couto, Stylianos Basagiannis, El Hassan Ridouane, Erica Zavaglio, Pasquale Antonante, Hajer Saada, Sara Falleni:
Lessons Learned Using FMI Co-simulation for Model-Based Design of Cyber Physical Systems. ISoLA (3) 2018: 488-503 - 2017
- [c16]Sophia G. Petridou, Stylianos Basagiannis, Lefteris Mamatas:
Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs. ICC 2017: 1-6 - [c15]Pasquale Antonante, Juan Valverde-Alcalá, Stylianos Basagiannis, Marco Di Natale:
Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design Approach. SAFECOMP Workshops 2017: 141-156 - [c14]Luís Diogo Couto, Stylianos Basagiannis, El Hassan Ridouane, Alie El-Din Mady, Miran Hasanagic, Peter Gorm Larsen:
Injecting Formal Verification in FMI-Based Co-simulations of Cyber-Physical Systems. SEFM Workshops 2017: 284-299 - 2016
- [j7]Nikolaos Alexiou, Stylianos Basagiannis, Sophia G. Petridou:
Formal security analysis of near field communication using model checking. Comput. Secur. 60: 1-14 (2016) - [c13]Peter Gorm Larsen, John S. Fitzgerald, Jim Woodcock, Peter Fritzson, Jörg Brauer, Christian Kleijn, Thierry Lecomte, Markus Pfeil, Ole Green, Stylianos Basagiannis, Andrey Sadovykh:
Integrated tool chain for model-based design of Cyber-Physical Systems: The INTO-CPS project. CPS Data 2016: 1-6 - 2015
- [c12]Stylianos Basagiannis, Francisco José González-Espín:
Towards Verification of Multicore Motor-Drive Controllers in Aerospace. SAFECOMP Workshops 2015: 190-200 - 2014
- [c11]Nikolaos Alexiou, Stylianos Basagiannis, Sophia G. Petridou:
Security analysis of NFC relay attacks using probabilistic model checking. IWCMC 2014: 524-529 - 2013
- [j6]Sophia G. Petridou, Stylianos Basagiannis, Manos Roumeliotis:
Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks. IEEE Syst. J. 7(1): 4-12 (2013) - [c10]Fatih Turkmen, Simon N. Foley, Barry O'Sullivan, William M. Fitzgerald, Tarik Hadzic, Stylianos Basagiannis, Menouer Boubekeur:
Explanations and Relaxations for Policy Conflicts in Physical Access Control. ICTAI 2013: 330-336 - 2012
- [j5]Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis:
Formal analysis for robust anti-SPIT protection using model checking. Int. J. Inf. Sec. 11(2): 121-135 (2012) - [c9]Sophia G. Petridou, Stylianos Basagiannis:
Towards energy consumption evaluation of the SSL handshake protocol in mobile communications. WONS 2012: 135-138 - 2011
- [j4]Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros:
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach. Comput. Secur. 30(4): 257-272 (2011) - [j3]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Synthesis of attack actions using model checking for the verification of security protocols. Secur. Commun. Networks 4(2): 147-161 (2011) - [c8]Tushar Deshpande, Panagiotis Katsaros, Stylianos Basagiannis, Scott A. Smolka:
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking. HASE 2011: 360-367 - [c7]Sophia G. Petridou, Stylianos Basagiannis, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros:
Quantitative model checking of an RSA-based email protocol on mobile devices. ISCC 2011: 639-645 - [c6]Ioannis K. Paparrizos, Stylianos Basagiannis, Sophia G. Petridou:
Quantitative analysis for authentication of low-cost RFID tags. LCN 2011: 295-298 - [i3]Ioannis K. Paparrizos, Stylianos Basagiannis, Sophia G. Petridou:
Quantitative Analysis for Authentication of Low-cost RFID Tags. CoRR abs/1112.1086 (2011) - 2010
- [j2]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
An intruder model with message inspection for model checking security protocols. Comput. Secur. 29(1): 16-34 (2010) - [c5]Yannis Soupionis, Stylianos Basagiannis, Panagiotis Katsaros, Dimitris Gritzalis:
A Formally Verified Mechanism for Countering SPIT. CRITIS 2010: 128-139 - [c4]Nikolaos Alexiou, Stylianos Basagiannis, Panagiotis Katsaros, Tushar Deshpande, Scott A. Smolka:
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking. HASE 2010: 94-103
2000 – 2009
- 2009
- [b1]Stylianos Basagiannis:
Ανάπτυξη τυπικών μεθόδων για τον έλεγχο πρωτοκόλλων ασφαλείας. Aristotle University Of Thessaloniki, Greece, 2009 - [j1]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou:
Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6): 450-465 (2009) - [i2]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Attacking an OT-Based Blind Signature Scheme. CoRR abs/0906.2947 (2009) - [i1]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
State Space Reduction with Message Inspection in Security Protocol Model Checking. CoRR abs/0909.0174 (2009) - 2008
- [c3]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou:
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. COMPSAC 2008: 12-19 - 2007
- [c2]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. SAFECOMP 2007: 238-251 - 2006
- [c1]Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker. ISPA 2006: 317-328
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint