The SCEAS System
Navigation Menu

Search the dblp DataBase


Panagiotis Katsaros: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Panagiotis Katsaros, Constantine Lazos
    Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:762-771 [Conf]
  2. Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
    Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker. [Citation Graph (0, 0)][DBLP]
    ISPA, 2006, pp:317-328 [Conf]
  3. Panagiotis Katsaros
    On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2005, pp:941-959 [Conf]
  4. Panagiotis Katsaros, Nantia Iakovidou, Theodoros Soldatos
    Evaluation of composite object replication schemes for dependable server applications. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:9, pp:795-806 [Journal]
  5. George Kakarontzas, Panagiotis Katsaros, Ioannis Stamelos
    Elastic Components: Addressing Variance of Quality Properties in Components. [Citation Graph (0, 0)][DBLP]
    EUROMICRO-SEAA, 2007, pp:31-38 [Conf]
  6. Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
    Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:238-251 [Conf]

  7. Static Program Analysis for Java Card Applets. [Citation Graph (, )][DBLP]

  8. A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. [Citation Graph (, )][DBLP]

  9. Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs. [Citation Graph (, )][DBLP]

  10. Product Line Variability with Elastic Components and Test-Driven Development. [Citation Graph (, )][DBLP]

  11. Towards Compositional Safety Analysis via Semantic Representation of Component Failure Behaviour. [Citation Graph (, )][DBLP]

  12. Probabilistic model checking for the quantification of DoS security threats. [Citation Graph (, )][DBLP]

  13. An intruder model with message inspection for model checking security protocols. [Citation Graph (, )][DBLP]

  14. Performance and effectiveness trade-off for checkpointing in fault-tolerant distributed systems. [Citation Graph (, )][DBLP]

  15. Attacking an OT-Based Blind Signature Scheme [Citation Graph (, )][DBLP]

  16. State Space Reduction with Message Inspection in Security Protocol Model Checking [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002