BibTeX records: Ricardo J. Rodríguez

download as .bib file

@article{DBLP:journals/di/UrozR19,
  author    = {Daniel Uroz and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {Characteristics and detectability of Windows auto-start extensibility
               points in memory forensics},
  journal   = {Digital Investigation},
  volume    = {28},
  number    = {Supplement},
  pages     = {S95--S104},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.diin.2019.01.026},
  doi       = {10.1016/j.diin.2019.01.026},
  timestamp = {Thu, 16 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/di/UrozR19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SelviRS19,
  author    = {Jose Selvi and
               Ricardo J. Rodr{\'{\i}}guez and
               Emilio Soria{-}Olivas},
  title     = {Detection of algorithmically generated malicious domain names using
               masked N-grams},
  journal   = {Expert Syst. Appl.},
  volume    = {124},
  pages     = {156--163},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.eswa.2019.01.050},
  doi       = {10.1016/j.eswa.2019.01.050},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/SelviRS19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ShiCRZT19,
  author    = {Yu Shi and
               Xiaolin Chang and
               Ricardo J. Rodr{\'{\i}}guez and
               Zhenjiang Zhang and
               Kishor S. Trivedi},
  title     = {Quantitative security analysis of a dynamic network system under lateral
               movement-based attacks},
  journal   = {Rel. Eng. {\&} Sys. Safety},
  volume    = {183},
  pages     = {213--225},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ress.2018.11.022},
  doi       = {10.1016/j.ress.2018.11.022},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ress/ShiCRZT19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/GomezRCV19,
  author    = {Abel G{\'{o}}mez and
               Ricardo J. Rodr{\'{\i}}guez and
               Mar{\'{\i}}a{-}Emilia Cambronero and
               Valent{\'{\i}}n Valero},
  title     = {Profiling the publish/subscribe paradigm for automated analysis using
               colored Petri nets},
  journal   = {Software and Systems Modeling},
  volume    = {18},
  number    = {5},
  pages     = {2973--3003},
  year      = {2019},
  url       = {https://doi.org/10.1007/s10270-019-00716-1},
  doi       = {10.1007/s10270-019-00716-1},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sosym/GomezRCV19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcst/RodriguezC19,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Javier Campos},
  title     = {On Throughput Approximation of Resource-Allocation Systems by Bottleneck
               Regrowing},
  journal   = {{IEEE} Trans. Contr. Sys. Techn.},
  volume    = {27},
  number    = {1},
  pages     = {370--377},
  year      = {2019},
  url       = {https://doi.org/10.1109/TCST.2017.2768512},
  doi       = {10.1109/TCST.2017.2768512},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tcst/RodriguezC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChangWRZ18,
  author    = {Xiaolin Chang and
               Tianju Wang and
               Ricardo J. Rodr{\'{\i}}guez and
               Zhenjiang Zhang},
  title     = {Modeling and Analysis of High Availability Techniques in a Virtualized
               System},
  journal   = {Comput. J.},
  volume    = {61},
  number    = {2},
  pages     = {180--198},
  year      = {2018},
  url       = {https://doi.org/10.1093/comjnl/bxx049},
  doi       = {10.1093/comjnl/bxx049},
  timestamp = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cj/ChangWRZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuCHTR18,
  author    = {Bo Liu and
               Xiaolin Chang and
               Zhen Han and
               Kishor S. Trivedi and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {Model-based sensitivity analysis of IaaS cloud availability},
  journal   = {Future Generation Comp. Syst.},
  volume    = {83},
  pages     = {1--13},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2017.12.062},
  doi       = {10.1016/j.future.2017.12.062},
  timestamp = {Tue, 03 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/LiuCHTR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ChangLRT18,
  author    = {Xiaolin Chang and
               ShaoHua Lv and
               Ricardo J. Rodr{\'{\i}}guez and
               Kishor S. Trivedi},
  title     = {Survivability Model for Security and Dependability Analysis of a Vulnerable
               Critical System},
  booktitle = {27th International Conference on Computer Communication and Networks,
               {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/icccn/2018},
  url       = {https://doi.org/10.1109/ICCCN.2018.8487446},
  doi       = {10.1109/ICCCN.2018.8487446},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/ChangLRT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/Rodriguez17,
  author    = {Ricardo J. Rodr{\'{\i}}guez},
  title     = {A Petri net tool for software performance estimation based on upper
               throughput bounds},
  journal   = {Autom. Softw. Eng.},
  volume    = {24},
  number    = {1},
  pages     = {73--99},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10515-015-0186-2},
  doi       = {10.1007/s10515-015-0186-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ase/Rodriguez17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RodriguezG17,
  author    = {Ricardo Julio Rodr{\'{\i}}guez and
               Juan Carlos Garc{\'{\i}}a{-}Escart{\'{\i}}n},
  title     = {Security assessment of the Spanish contactless identity card},
  journal   = {{IET} Information Security},
  volume    = {11},
  number    = {6},
  pages     = {386--393},
  year      = {2017},
  url       = {https://doi.org/10.1049/iet-ifs.2017.0299},
  doi       = {10.1049/iet-ifs.2017.0299},
  timestamp = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iet-ifs/RodriguezG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Rodriguez17,
  author    = {Ricardo J. Rodr{\'{\i}}guez},
  title     = {Erratum to: Evolution and characterization of point-of-sale {RAM}
               scraping malware},
  journal   = {J. Computer Virology and Hacking Techniques},
  volume    = {13},
  number    = {2},
  pages     = {139},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11416-016-0285-z},
  doi       = {10.1007/s11416-016-0285-z},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/virology/Rodriguez17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Rodriguez17a,
  author    = {Ricardo J. Rodr{\'{\i}}guez},
  title     = {Evolution and characterization of point-of-sale {RAM} scraping malware},
  journal   = {J. Computer Virology and Hacking Techniques},
  volume    = {13},
  number    = {3},
  pages     = {179--192},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11416-016-0280-4},
  doi       = {10.1007/s11416-016-0280-4},
  timestamp = {Tue, 01 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/virology/Rodriguez17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcomp/BotasRMG17,
  author    = {Alvaro Botas and
               Ricardo J. Rodr{\'{\i}}guez and
               Vicente Matell{\'{a}}n and
               Juan F. Garc{\'{\i}}a},
  title     = {Empirical Study to Fingerprint Public Malware Analysis Services},
  booktitle = {International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, Le{\'{o}}n,
               Spain, September 6-8, 2017, Proceedings},
  pages     = {589--599},
  year      = {2017},
  crossref  = {DBLP:conf/softcomp/2017},
  url       = {https://doi.org/10.1007/978-3-319-67180-2\_57},
  doi       = {10.1007/978-3-319-67180-2\_57},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/softcomp/BotasRMG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/ZimmermannLR17,
  author    = {Armin Zimmermann and
               Andr{\'{e}}s Canabal Lavista and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {Some Notes on Rare-Event Simulation Challenges},
  booktitle = {Proceedings of the 11th {EAI} International Conference on Performance
               Evaluation Methodologies and Tools, {VALUETOOLS} 2017, Venice, Italy,
               December 05-07, 2017},
  pages     = {263--264},
  year      = {2017},
  crossref  = {DBLP:conf/valuetools/2017},
  url       = {https://doi.org/10.1145/3150928.3150963},
  doi       = {10.1145/3150928.3150963},
  timestamp = {Wed, 23 Jan 2019 13:28:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/valuetools/ZimmermannLR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/Rodriguez16,
  author    = {Ricardo J. Rodr{\'{\i}}guez},
  title     = {On Qualitative Analysis of Fault Trees Using Structurally Persistent
               Nets},
  journal   = {{IEEE} Trans. Systems, Man, and Cybernetics: Systems},
  volume    = {46},
  number    = {2},
  pages     = {282--293},
  year      = {2016},
  url       = {https://doi.org/10.1109/TSMC.2015.2437360},
  doi       = {10.1109/TSMC.2015.2437360},
  timestamp = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsmc/Rodriguez16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GarciaR16,
  author    = {Laura Garc{\'{\i}}a and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {A Peek under the Hood of iOS Malware},
  booktitle = {11th International Conference on Availability, Reliability and Security,
               {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages     = {590--598},
  year      = {2016},
  crossref  = {DBLP:conf/IEEEares/2016},
  url       = {https://doi.org/10.1109/ARES.2016.15},
  doi       = {10.1109/ARES.2016.15},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/GarciaR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RodriguezCLT16,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Xiaolin Chang and
               Xiaodan Li and
               Kishor S. Trivedi},
  title     = {Survivability Analysis of a Computer System Under an Advanced Persistent
               Threat Attack},
  booktitle = {Graphical Models for Security - Third International Workshop, GraMSec
               2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  pages     = {134--149},
  year      = {2016},
  crossref  = {DBLP:conf/csfw/2016gramsec},
  url       = {https://doi.org/10.1007/978-3-319-46263-9\_9},
  doi       = {10.1007/978-3-319-46263-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/RodriguezCLT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NardoneRM16,
  author    = {Roberto Nardone and
               Ricardo J. Rodr{\'{\i}}guez and
               Stefano Marrone},
  title     = {Formal security assessment of Modbus protocol},
  booktitle = {11th International Conference for Internet Technology and Secured
               Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages     = {142--147},
  year      = {2016},
  crossref  = {DBLP:conf/icitst/2016},
  url       = {https://doi.org/10.1109/ICITST.2016.7856685},
  doi       = {10.1109/ICITST.2016.7856685},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/NardoneRM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2016,
  editor    = {Juan Caballero and
               Urko Zurutuza and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
               Spain, July 7-8, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9721},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-40667-1},
  doi       = {10.1007/978-3-319-40667-1},
  isbn      = {978-3-319-40666-4},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MarroneRNFV15,
  author    = {Stefano Marrone and
               Ricardo J. Rodr{\'{\i}}guez and
               Roberto Nardone and
               Francesco Flammini and
               Valeria Vittorini},
  title     = {On synergies of cyber and physical security modelling in vulnerability
               assessment of railway systems},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {47},
  pages     = {275--285},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.compeleceng.2015.07.011},
  doi       = {10.1016/j.compeleceng.2015.07.011},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cee/MarroneRNFV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/RodriguezMB15,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jos{\'{e}} Merseguer and
               Simona Bernardi},
  title     = {Modelling Security of Critical Infrastructures: {A} Survivability
               Assessment},
  journal   = {Comput. J.},
  volume    = {58},
  number    = {10},
  pages     = {2313--2327},
  year      = {2015},
  url       = {https://doi.org/10.1093/comjnl/bxu096},
  doi       = {10.1093/comjnl/bxu096},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/RodriguezMB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BotasRVZ15,
  author    = {Alvaro Botas and
               Ricardo J. Rodr{\'{\i}}guez and
               Teemu Uolevi V{\"{a}}is{\"{a}}nen and
               Patrycjusz Zdzichowski},
  title     = {Counterfeiting and Defending the Digital Forensic Process},
  booktitle = {15th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing
               and Communications, {IUCC} 2015; 13th {IEEE} International Conference
               on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE}
               International Conference on Pervasive Intelligence and Computing,
               PICom 2015, Liverpool, United Kingdom, October 26-28, 2015},
  pages     = {1966--1971},
  year      = {2015},
  crossref  = {DBLP:conf/IEEEcit/2015},
  url       = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.291},
  doi       = {10.1109/CIT/IUCC/DASC/PICOM.2015.291},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/BotasRVZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/RodriguezM15,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Stefano Marrone},
  title     = {Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems},
  booktitle = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International
               Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es,
               Portugal, October 2015},
  pages     = {439--449},
  year      = {2015},
  crossref  = {DBLP:conf/idc/2015},
  url       = {https://doi.org/10.1007/978-3-319-25017-5\_41},
  doi       = {10.1007/978-3-319-25017-5\_41},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idc/RodriguezM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/VilaR15,
  author    = {Jos{\'{e}} Vila and
               Ricardo J. Rodr{\'{\i}}guez},
  title     = {Practical Experiences on {NFC} Relay Attacks with Android - Virtual
               Pickpocketing Revisited},
  booktitle = {Radio Frequency Identification. Security and Privacy Issues - 11th
               International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24,
               2015, Revised Selected Papers},
  pages     = {87--103},
  year      = {2015},
  crossref  = {DBLP:conf/rfidsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-24837-0\_6},
  doi       = {10.1007/978-3-319-24837-0\_6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/VilaR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/RodriguezG14,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Elena G{\'{o}}mez{-}Mart{\'{\i}}nez},
  title     = {Model-Based Safety Assessment Using {OCL} and Petri Nets},
  booktitle = {40th {EUROMICRO} Conference on Software Engineering and Advanced Applications,
               {EUROMICRO-SEAA} 2014, Verona, Italy, August 27-29, 2014},
  pages     = {56--59},
  year      = {2014},
  crossref  = {DBLP:conf/euromicro/2014},
  url       = {https://doi.org/10.1109/SEAA.2014.36},
  doi       = {10.1109/SEAA.2014.36},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euromicro/RodriguezG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/RodriguezP14,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Sasikumar Punnekkat},
  title     = {Cost Optimisation in Certification of Software Product Lines},
  booktitle = {25th {IEEE} International Symposium on Software Reliability Engineering
               Workshops, {ISSRE} Workshops, Naples, Italy, November 3-6, 2014},
  pages     = {509--514},
  year      = {2014},
  crossref  = {DBLP:conf/issre/2014w},
  url       = {https://doi.org/10.1109/ISSREW.2014.103},
  doi       = {10.1109/ISSREW.2014.103},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/issre/RodriguezP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/Gomez-MartinezRERE14,
  author    = {Elena G{\'{o}}mez{-}Mart{\'{\i}}nez and
               Ricardo J. Rodr{\'{\i}}guez and
               Leire Etxeberria Elorza and
               Miren Illarramendi Rezabal and
               Clara Benac Earle},
  title     = {Model-Based Verification of Safety Contracts},
  booktitle = {Software Engineering and Formal Methods - {SEFM} 2014 Collocated Workshops:
               HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS, Grenoble, France, September
               1-2, 2014, Revised Selected Papers},
  pages     = {101--115},
  year      = {2014},
  crossref  = {DBLP:conf/sefm/2014w},
  url       = {https://doi.org/10.1007/978-3-319-15201-1\_7},
  doi       = {10.1007/978-3-319-15201-1\_7},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sefm/Gomez-MartinezRERE14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/RodriguezFHM14,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Lars{-}{\AA}ke Fredlund and
               {\'{A}}ngel Herranz{-}Nieva and
               Julio Mari{\~{n}}o},
  title     = {Execution and Verification of {UML} State Machines with Erlang},
  booktitle = {Software Engineering and Formal Methods - 12th International Conference,
               {SEFM} 2014, Grenoble, France, September 1-5, 2014. Proceedings},
  pages     = {284--289},
  year      = {2014},
  crossref  = {DBLP:conf/sefm/2014},
  url       = {https://doi.org/10.1007/978-3-319-10431-7\_22},
  doi       = {10.1007/978-3-319-10431-7\_22},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sefm/RodriguezFHM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/RodriguezJM13,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jorge J{\'{u}}lvez and
               Jos{\'{e}} Merseguer},
  title     = {On the Performance Estimation and Resource Optimization in Process
               Petri Nets},
  journal   = {{IEEE} Trans. Systems, Man, and Cybernetics: Systems},
  volume    = {43},
  number    = {6},
  pages     = {1385--1398},
  year      = {2013},
  url       = {https://doi.org/10.1109/TSMC.2013.2245118},
  doi       = {10.1109/TSMC.2013.2245118},
  timestamp = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsmc/RodriguezJM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsd/RodriguezJM12,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jorge J{\'{u}}lvez and
               Jos{\'{e}} Merseguer},
  title     = {PeabraiN: {A} {PIPE} Extension for Performance Estimation and Resource
               Optimisation},
  booktitle = {12th International Conference on Application of Concurrency to System
               Design, {ACSD} 2012, Hamburg, Germany, June 27-29, 2012},
  pages     = {142--147},
  year      = {2012},
  crossref  = {DBLP:conf/acsd/2012},
  url       = {https://doi.org/10.1109/ACSD.2012.13},
  doi       = {10.1109/ACSD.2012.13},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsd/RodriguezJM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/RodriguezTR12,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Rafael Tolosana{-}Calasanz and
               Omer F. Rana},
  title     = {Automating Data-Throttling Analysis for Data-Intensive Workflows},
  booktitle = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
               Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012},
  pages     = {310--317},
  year      = {2012},
  crossref  = {DBLP:conf/ccgrid/2012},
  url       = {https://doi.org/10.1109/CCGrid.2012.27},
  doi       = {10.1109/CCGrid.2012.27},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccgrid/RodriguezTR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isarcs/RodriguezTM12,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Catia Trubiani and
               Jos{\'{e}} Merseguer},
  title     = {Fault-tolerant techniques and security mechanisms for model-based
               performance prediction of critical systems},
  booktitle = {Proceedings of the 3rd international {ACM} {SIGSOFT} symposium on
               Architecting Critical Systems, {ISARCS} 2012, part of Comparch '12
               Federated Events on Component-Based Software Engineering and Software
               Architecture, Bertinoro, Italy, June 25-28, 2012},
  pages     = {21--30},
  year      = {2012},
  crossref  = {DBLP:conf/isarcs/2012},
  url       = {https://doi.org/10.1145/2304656.2304660},
  doi       = {10.1145/2304656.2304660},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isarcs/RodriguezTM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/RodriguezTR12,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Rafael Tolosana{-}Calasanz and
               Omer F. Rana},
  title     = {Measuring the Effectiveness of Throttled Data Transfers on Data-Intensive
               Workflows},
  booktitle = {Agent and Multi-Agent Systems. Technologies and Applications - 6th
               {KES} International Conference, {KES-AMSTA} 2012,Dubrovnik, Croatia,
               June 25-27, 2012. Proceedings},
  pages     = {144--153},
  year      = {2012},
  crossref  = {DBLP:conf/kesamsta/2012},
  url       = {https://doi.org/10.1007/978-3-642-30947-2\_18},
  doi       = {10.1007/978-3-642-30947-2\_18},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/kesamsta/RodriguezTR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/RodriguezJ10,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jorge J{\'{u}}lvez},
  title     = {Accurate Performance Estimation for Stochastic Marked Graphs by Bottleneck
               Regrowing},
  booktitle = {Computer Performance Engineering - 7th European Performance Engineering
               Workshop, {EPEW} 2010, Bertinoro, Italy, September 23-24, 2010. Proceedings},
  pages     = {175--190},
  year      = {2010},
  crossref  = {DBLP:conf/epew/2010},
  url       = {https://doi.org/10.1007/978-3-642-15784-4\_12},
  doi       = {10.1007/978-3-642-15784-4\_12},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/epew/RodriguezJ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isarcs/RodriguezM10,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jos{\'{e}} Merseguer},
  title     = {Integrating Fault-Tolerant Techniques into the Design of Critical
               Systems},
  booktitle = {Architecting Critical Systems, First International Symposium, {ISARCS}
               2010, Prague, Czech Republic, June 23-25, 2010, Proceedings},
  pages     = {33--51},
  year      = {2010},
  crossref  = {DBLP:conf/isarcs/2010},
  url       = {https://doi.org/10.1007/978-3-642-13556-9\_3},
  doi       = {10.1007/978-3-642-13556-9\_3},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isarcs/RodriguezM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serene/RodriguezMB10,
  author    = {Ricardo J. Rodr{\'{\i}}guez and
               Jos{\'{e}} Merseguer and
               Simona Bernardi},
  title     = {Modelling and analysing resilience as a security issue within {UML}},
  booktitle = {Proceedings of the 2nd International Workshop on Software Engineering
               for Resilient Systems, {SERENE} '10, London, United Kingdom, April
               15-16, 2010},
  pages     = {42--51},
  year      = {2010},
  crossref  = {DBLP:conf/serene/2010},
  url       = {https://doi.org/10.1145/2401736.2401741},
  doi       = {10.1145/2401736.2401741},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/serene/RodriguezMB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2018,
  title     = {27th International Conference on Computer Communication and Networks,
               {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8486798/proceeding},
  isbn      = {978-1-5386-5156-8},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/softcomp/2017,
  editor    = {Hilde P{\'{e}}rez Garc{\'{\i}}a and
               Javier Alfonso{-}Cend{\'{o}}n and
               Lidia S{\'{a}}nchez{-}Gonz{\'{a}}lez and
               H{\'{e}}ctor Quinti{\'{a}}n and
               Emilio Corchado},
  title     = {International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, Le{\'{o}}n,
               Spain, September 6-8, 2017, Proceedings},
  series    = {Advances in Intelligent Systems and Computing},
  volume    = {649},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-67180-2},
  doi       = {10.1007/978-3-319-67180-2},
  isbn      = {978-3-319-67179-6},
  timestamp = {Thu, 24 Aug 2017 16:13:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/softcomp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/valuetools/2017,
  editor    = {Andrea Marin and
               Benny Van Houdt and
               Giuliano Casale and
               Dorina C. Petriu and
               Sabina Rossi},
  title     = {Proceedings of the 11th {EAI} International Conference on Performance
               Evaluation Methodologies and Tools, {VALUETOOLS} 2017, Venice, Italy,
               December 05-07, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3150928},
  timestamp = {Wed, 23 Jan 2019 13:28:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/valuetools/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2016,
  title     = {11th International Conference on Availability, Reliability and Security,
               {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7777698/proceeding},
  isbn      = {978-1-5090-0990-9},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2016gramsec,
  editor    = {Barbara Kordy and
               Mathias Ekstedt and
               Dong Seong Kim},
  title     = {Graphical Models for Security - Third International Workshop, GraMSec
               2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9987},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-46263-9},
  doi       = {10.1007/978-3-319-46263-9},
  isbn      = {978-3-319-46262-2},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2016gramsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2016,
  title     = {11th International Conference for Internet Technology and Secured
               Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7847254/proceeding},
  isbn      = {978-1-908320-73-5},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcit/2015,
  editor    = {Yulei Wu and
               Geyong Min and
               Nektarios Georgalas and
               Jia Hu and
               Luigi Atzori and
               Xiaolong Jin and
               Stephen A. Jarvis and
               Lei (Chris) Liu and
               Ram{\'{o}}n Ag{\"{u}}ero Calvo},
  title     = {15th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing
               and Communications, {IUCC} 2015; 13th {IEEE} International Conference
               on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE}
               International Conference on Pervasive Intelligence and Computing,
               PICom 2015, Liverpool, United Kingdom, October 26-28, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7361821/proceeding},
  isbn      = {978-1-5090-0154-5},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/idc/2015,
  editor    = {Paulo Novais and
               David Camacho and
               Cesar Analide and
               Amal El Fallah{-}Seghrouchni and
               Costin Badica},
  title     = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International
               Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es,
               Portugal, October 2015},
  series    = {Studies in Computational Intelligence},
  volume    = {616},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-25017-5},
  doi       = {10.1007/978-3-319-25017-5},
  isbn      = {978-3-319-25015-1},
  timestamp = {Sun, 02 Jun 2019 21:12:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2015,
  editor    = {Stefan Mangard and
               Patrick Schaumont},
  title     = {Radio Frequency Identification. Security and Privacy Issues - 11th
               International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24,
               2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9440},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24837-0},
  doi       = {10.1007/978-3-319-24837-0},
  isbn      = {978-3-319-24836-3},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euromicro/2014,
  title     = {40th {EUROMICRO} Conference on Software Engineering and Advanced Applications,
               {EUROMICRO-SEAA} 2014, Verona, Italy, August 27-29, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6921520/proceeding},
  isbn      = {978-1-4799-5795-8},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euromicro/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issre/2014w,
  title     = {25th {IEEE} International Symposium on Software Reliability Engineering
               Workshops, {ISSRE} Workshops, Naples, Italy, November 3-6, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6982004/proceeding},
  isbn      = {978-1-4799-7377-4},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/issre/2014w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sefm/2014w,
  editor    = {Carlos Canal and
               Akram Idani},
  title     = {Software Engineering and Formal Methods - {SEFM} 2014 Collocated Workshops:
               HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS, Grenoble, France, September
               1-2, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8938},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-15201-1},
  doi       = {10.1007/978-3-319-15201-1},
  isbn      = {978-3-319-15200-4},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sefm/2014w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sefm/2014,
  editor    = {Dimitra Giannakopoulou and
               Gwen Sala{\"{u}}n},
  title     = {Software Engineering and Formal Methods - 12th International Conference,
               {SEFM} 2014, Grenoble, France, September 1-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8702},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10431-7},
  doi       = {10.1007/978-3-319-10431-7},
  isbn      = {978-3-319-10430-0},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sefm/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsd/2012,
  editor    = {Jens Brandt and
               Keijo Heljanko},
  title     = {12th International Conference on Application of Concurrency to System
               Design, {ACSD} 2012, Hamburg, Germany, June 27-29, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6253058/proceeding},
  isbn      = {978-0-7695-4709-1},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsd/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccgrid/2012,
  title     = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
               Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6217395/proceeding},
  isbn      = {978-1-4673-1395-7},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccgrid/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isarcs/2012,
  editor    = {Vincenzo Grassi and
               Raffaela Mirandola and
               Jorge Cu{\'{e}}llar and
               Javier L{\'{o}}pez},
  title     = {Proceedings of the 3rd international {ACM} {SIGSOFT} symposium on
               Architecting Critical Systems, {ISARCS} 2012, part of Comparch '12
               Federated Events on Component-Based Software Engineering and Software
               Architecture, Bertinoro, Italy, June 25-28, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2304656},
  isbn      = {978-1-4503-1347-6},
  timestamp = {Sat, 06 Jan 2018 16:24:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isarcs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/kesamsta/2012,
  editor    = {Gordan Jezic and
               Mario Kusek and
               Ngoc Thanh Nguyen and
               Robert J. Howlett and
               Lakhmi C. Jain},
  title     = {Agent and Multi-Agent Systems. Technologies and Applications - 6th
               {KES} International Conference, {KES-AMSTA} 2012,Dubrovnik, Croatia,
               June 25-27, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7327},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30947-2},
  doi       = {10.1007/978-3-642-30947-2},
  isbn      = {978-3-642-30946-5},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/kesamsta/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/epew/2010,
  editor    = {Alessandro Aldini and
               Marco Bernardo and
               Luciano Bononi and
               Vittorio Cortellessa},
  title     = {Computer Performance Engineering - 7th European Performance Engineering
               Workshop, {EPEW} 2010, Bertinoro, Italy, September 23-24, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6342},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15784-4},
  doi       = {10.1007/978-3-642-15784-4},
  isbn      = {978-3-642-15783-7},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/epew/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isarcs/2010,
  editor    = {Holger Giese},
  title     = {Architecting Critical Systems, First International Symposium, {ISARCS}
               2010, Prague, Czech Republic, June 23-25, 2010, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6150},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13556-9},
  doi       = {10.1007/978-3-642-13556-9},
  isbn      = {978-3-642-13555-2},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isarcs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/serene/2010,
  editor    = {Giovanna Di Marzo Serugendo and
               John S. Fitzgerald},
  title     = {Proceedings of the 2nd International Workshop on Software Engineering
               for Resilient Systems, {SERENE} '10, London, United Kingdom, April
               15-16, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/2401736},
  doi       = {10.1145/2401736},
  isbn      = {978-1-4503-0289-0},
  timestamp = {Mon, 22 Jul 2019 17:31:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/serene/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics