• 677 Citations
19972019
If you made any changes in Pure these will be visible here soon.

Research Output 1997 2019

2019
1 Citation (Scopus)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Cham: Springer, p. 461-481 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11543 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Situational Awareness
Anomaly Detection
Intrusion detection
Network protocols

Using provenance for secure data fusion in cooperative systems

Bertolissi, C., den Hartog, J. & Zannone, N., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc, p. 185-194 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Access control
2018
1 Citation (Scopus)

Feature selection for anomaly detection in vehicular ad hoc networks

Le, V. H., den Hartog, J. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 481-491 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Vehicular ad hoc networks
Feature extraction
Information use
Communication
Accidents
5 Citations (Scopus)

Security and privacy for innovative automotive applications: a survey

Le, V. H., den Hartog, J. & Zannone, N., Nov 2018, In : Computer Communications. 132, p. 17-41 25 p.

Research output: Contribution to journalReview articleAcademicpeer-review

2017
13 Citations (Scopus)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, p. 27-46

Research output: Contribution to journalArticleAcademicpeer-review

Agglomeration
Neural networks
Feedback
Industry

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Cryptography
Control systems
Telecommunication networks
10 Citations (Scopus)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Markup languages
Query languages
XML
Specifications
4 Citations (Scopus)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
2016
8 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
2 Citations (Scopus)

An authorization service for collaborative situation awareness

Egner, A. I., Luu, D. M., den Hartog, J. & Zannone, N., 9 Mar 2016, CODASPY '16 Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 136-138 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

A policy framework for data fusion and derived data control

den Hartog, J. & Zannone, N., 11 Mar 2016, ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: Association for Computing Machinery, Inc, p. 47-57 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Electric fuses
Access control
Processing
1 Citation (Scopus)

Collaborative access decisions: why has my decision not been enforced?

den Hartog, J. I. & Zannone, N., 2016, Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I., Singh Gaur, M., Conti, M., Sanghi, D. & Kamakoti, V. (eds.). Dordrecht: Springer, p. 109-130 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10063 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Feedback
Collaborative Systems
Justification
Social Networks

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016

Research output: Contribution to conferencePosterAcademic

3 Citations (Scopus)

Data governance and transparency for collaborative systems

Mahmudlu, R., den Hartog, J. & Zannone, N., 2016, Data and Applications Security and Privacy. Springer, p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collaborative Systems
Governance
Transparency
Requirements
Access Control
13 Citations (Scopus)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, p. 2063-2070

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intrusion detection
Control systems
Telecommunication networks
Semantics

Towards creating believable decoy project folders for detecting data theft

Thaler, S., den Hartog, J. & Petkovic, M., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer, p. 161-169 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Markov processes
User Studies
Data-driven
Markov chain
Attack
4 Citations (Scopus)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 Nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, p. 509-520

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Feature extraction
Experiments
2015
24 Citations (Scopus)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry

Cross-domain attribute conversion for authentication and authorization

Thaler, S., Den Hartog, J., Ayed, D., Sommer, D. & Hitchens, M., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Institute of Electrical and Electronics Engineers, p. 652-659 8 p. 7299976

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Terminology
Ontology
Animals

Introducing probabilities in controller strategies

Hartog, den, J. I. & Matteucci, J., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers): 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomarti, J., Lupu, E., Posegga, J., Aldini, A., Martonelli, F. & Suri, N. (eds.). Berlin: Springer, p. 233-249 (Lecture Notes in Computer Science; vol. 8872)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Controllers
Specifications

Privacy throughout the data cycle

Costante, E., 31 Mar 2015, Eindhoven: Technische Universiteit Eindhoven. 182 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
12 Citations (Scopus)

SAFAX: an extensible authorization service for cloud environments

Kaluvuri, S. P., Egner, A. I., Den Hartog, J. I. & Zannone, N., 2015, In : Frontiers in ICT. 2, 15 p., 9

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
4 Citations (Scopus)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model
2014

Analysis of XACML policies with SMT

Turkmen, F., Hartog, den, J. I., Ranise, S. & Zannone, N., 2014, Eindhoven: Technische Universiteit Eindhoven. 25 p. (Computer science reports; vol. 1408)

Research output: Book/ReportReportAcademic

Open Access
File
Surface mount technology
Access control
XML
Markup languages
Specifications

Analyzing access control policies with SMT

Turkmen, F., Hartog, den, J. I. & Zannone, N., 2014, p. 1508-1510

Research output: Contribution to conferencePosterAcademic

Open Access
File
Access control
Markup languages
Specifications
10 Citations (Scopus)

CollAC: Collaborative access control

Damen, S., Hartog, den, J. I. & Zannone, N., 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014, Minneapolis MN, USA, May 19-23, 2014). Institute of Electrical and Electronics Engineers, p. 142-149

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Decision making

Dissecting unlinkability

Bruso, M., 2014, Eindhoven: Technische Universiteit Eindhoven. 148 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
10 Citations (Scopus)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry
3 Citations (Scopus)

Integration of data-minimising authentication into authorisation systems

Ayed, D., Bichsel, P., Camenisch, J. & Hartog, den, J. I., 2014, Trust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings). Holz, T. & Ioannidis, S. (eds.). Berlin: Springer, p. 179-187 (Lecture Notes in Computer Science; vol. 8564)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Information systems

Wafer exchange simulation

Nelisse, J. J. & Technische Universiteit Eindhoven (TUE). Stan Ackermans Instituut. Software Technology (ST), 1 Oct 2014, Eindhoven: Technische Universiteit Eindhoven.

Research output: ThesisPd Eng ThesisAcademic

Open Access
File
Simulators
Hardware
Testing
Software testing
Lithography
2013
7 Citations (Scopus)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (eds.). Berlin: Springer, p. 129-144 (Lecture Notes in Computer Science; vol. 8191)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

privacy
voting
event
lack
literature

POSTER-TRIPLEX : verifying data minimisation in communication systems

Veeningen, M. G., Bruso, M., Hartog, den, J. I. & Zannone, N., 2013, p. 1415-1418

Research output: Contribution to conferencePosterAcademic

Communication systems
Communication
10 Citations (Scopus)

Trust management and user's trust perception in e-business

Costante, E., Petkovic, M. & den Hartog, J., 28 Feb 2013, IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 64-83 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Industry
Access control
User interfaces
Websites
Internet
8 Citations (Scopus)

What websites know about you : privacy policy analysis using information extraction

Costante, E., Hartog, den, J. I. & Petkovic, M., 2013, Data Privacy Management and Autonomous Spontaneous Security (7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers). Di Pietro, R., Herranz, J., Damiani, E. & State, R. (eds.). Berlin: Springer, p. 146-159 (Lecture Notes in Computer Science; vol. 7731)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information analysis
Data privacy
Websites
Internet
2012
27 Citations (Scopus)

A machine learning solution to assess privacy policy completeness

Costante, E., Sun, Y., Petkovic, M. & Hartog, den, J. I., 2012, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012), October 15, 2012, Raleigh NC, USA. Association for Computing Machinery, Inc, p. 91-96

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Learning systems
Data privacy
Websites

Information flow and declassification analysis for legacy and untrusted programs

Pontes Soares Rocha, B., 2012, Eindhoven: Technische Universiteit Eindhoven. 155 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
Static analysis
Access control
Industry

Simulation environment for maritime safety and security systems

Kotian, R. & Technische Universiteit Eindhoven (TUE). Stan Ackermans Instituut. Software Technology (ST), 2012, Eindhoven: Technische Universiteit Eindhoven.

Research output: ThesisPd Eng ThesisAcademic

Security systems
Sensors
Monitoring
XML
Websites

Trust management and user's trust perception in e-business

Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Trust management
Electronic business
End users
Service provider
Web sites
2011
19 Citations (Scopus)

Improving DPA by peak distribution analysis

Pan, J., Woudenberg, van, J. G. J., Hartog, den, J. I. & Witteman, M. F., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Berlin: Springer, p. 241-261 (Lecture Notes in Computer Science; vol. 6544)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Smart cards
Electric power utilization
Experiments
Side channel attack
4 Citations (Scopus)

My private cloud overview : a trust, privacy and security infrastructure for the cloud

Chadwick, D. W., Lievens, S. F., Hartog, den, J. I., Pashalidis, A. & Alhadeff, J., 2011, Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011). IEEE Computer Society, p. 752-753

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
privacy
infrastructure
legal agreement
management
audit
17 Citations (Scopus)

On-line trust perception: what really matters

Costante, E., Hartog, den, J. I. & Petkovic, M., 2011, Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11, Milan, Italy, September 8, 2011). Institute of Electrical and Electronics Engineers, p. 52-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Websites
Health
Internet

Preface of special issue on "Computer security : foundations and automated reasoning"

Bauer, L., Etalle, S., Hartog, den, J. I. & Viganò, L., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 223-224 2 p.

Research output: Contribution to journalEditorialAcademicpeer-review

Security of data
2010
17 Citations (Scopus)

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Privacy
Trust management
Management system
Factors
Authorization
41 Citations (Scopus)

Formal verification of privacy for RFID systems

Bruso, M., Chatzikokolakis, K. & Hartog, den, J. I., 2010, Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10, Edinburgh, UK, July 17-19, 2010). IEEE Computer Society, p. 75-88

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Radio frequency identification (RFID)
Network protocols
Formal verification
7 Citations (Scopus)

Principles on the security of AES against first and second-order differential power analysis

Lu, J., Pan, J. & Hartog, den, J. I., 2010, Applied Cryptography and Network Security (8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings). Zhou, J. & Yung, M. (eds.). Berlin: Springer, p. 168-185 (Lecture Notes in Computer Science; vol. 6123)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
10 Citations (Scopus)

Towards static flow-based declassification for legacy and untrusted programs

Pontes Soares Rocha, B., Bandhakavi, S., Hartog, den, J. I., Winsborough, W. H. & Etalle, S., 2010, Proceedings IEEE Symposium on Security and Privacy (SP, Oakland CA, USA, May 16-19, 2010). Institute of Electrical and Electronics Engineers, p. 93-108

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Static analysis
2009
1 Citation (Scopus)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (eds.). Berlin: Springer, p. 129-142 (Lecture Notes in Computer Science; vol. 5491)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

19 Citations (Scopus)

You cannot hide behind the mask : power analysis on a provably secure S-box implementation

Pan, J., Hartog, den, J. I. & Lu, J., 2009, Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ). Youm, H. Y. & Yung, M. (eds.). Berlin: Springer, p. 178-192 (Lecture Notes in Computer Science; vol. 5932)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Masks
Formal methods
Pattern matching
Experiments
Side channel attack