1. The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures;Armando,2012
2. Intruder deducibility constraints with negation. decidability and application to secured service compositions;Avanesov;arXiv preprint arXiv:1207.4871,2012
3. Intruder deducibility constraints with negation. decidability and application to secured service compositions;Avanesov;J. Symb. Comput.,2017
4. Design and verification of cyber-physical systems using truetime, evolutionary optimization and uppaal;Balasubramaniyan;Microprocess. Microsyst.,2016
5. Is rfid technology secure and private?;Bhaskar;RFID Handbook: Applications, Technology, Security, and Privacy,2017