<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Enrico Russo</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Scenario Design and Validation for Next Generation Cyber Ranges</style></title><secondary-title><style face="normal" font="default" size="100%">2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><pub-location><style face="normal" font="default" size="100%">Cambridge, MA, USA</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Konrad Wrona</style></author><author><style face="normal" font="default" size="100%">Sander Oudkerk</style></author><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Silvio Ranise</style></author><author><style face="normal" font="default" size="100%">Lisa Ferrari</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assisted Content-based Labelling and Classification of Documents</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Conference on Military Communications and Information System (ICMCIS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">23-24 May 2016</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author><author><style face="normal" font="default" size="100%">Luca Verderame</style></author><author><style face="normal" font="default" size="100%">Konrad Wrona</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Developing a NATO BYOD Security Policy</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Military Communications and Information System, ICMCIS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">23-24 May 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Brussels, Belgium</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author><author><style face="normal" font="default" size="100%">Luca Verderame</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enabling BYOD Through Secure Meta-market</style></title><secondary-title><style face="normal" font="default" size="100%">2014 ACM Conference on Security and Privacy in Wireless &amp; Mobile Networks, WiSec’14</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">23-25 July 2014</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Oxford, United Kingdom</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bring Your Own Device, Securely</style></title><secondary-title><style face="normal" font="default" size="100%">28th Annual ACM Symposium on Applied Computing, SAC’13</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18-22 March 2013</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Coimbra, Portugal</style></pub-location><pages><style face="normal" font="default" size="100%">1852–1858</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Luca Compagna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SAT-based Model-Checking for Security Protocols Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">3–32</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">D.A. Basin</style></author><author><style face="normal" font="default" size="100%">Y. Boichut</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Computer Aided Verification CAV 2005</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Heidelberg</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>