• 1710 Citations
1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

A survey of network intrusion detection systems for controller area network

Dupont, G., den Hartog, J., Etalle, S. & Lekidis, A., Sep 2019, 2019 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2019. Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 8906465

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, A., Wetzels, J., Holz, T. & Etalle, S., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 31-46 16 p. 8806725

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

Cappers, B. C. M., Meessen, P. N., Etalle, S. & Van Wijk, J. J., 9 May 2019, 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018. Trent, S., Kohlhammer, J., Sauer, G., Gove, R., Best, D., Paul, C. L., Prigent, N. & Staheli, D. (eds.). Institute of Electrical and Electronics Engineers, 8 p. 8709230

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
131 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R. & Almgren, M. (eds.). Cham: Springer, p. 461-481 21 p. (Lecture Notes in Computer Science; vol. 11543).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)
2018

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 17 Apr 2018, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
2 Citations (Scopus)
4 Downloads (Pure)

Eventpad : a visual analytics approach to network intrusion detection and reverse engineering

Cappers, B. C. M., van Wijk, J. J. & Etalle, S., 23 Apr 2018, European Cyper Security Perspectives 2018. Den Haag: KPN, p. 62-65 4 p.

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Open Access
File
97 Downloads (Pure)
2017

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 1 Feb 2017, In : Journal of Information Security and Applications. 32, p. 27-46 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)
9 Downloads (Pure)

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, 4-8 December 2017, Orlando, Florida. New York: Association for Computing Machinery, Inc, p. 437-448 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Citations (Scopus)
86 Downloads (Pure)

From intrusion detection to software design

Etalle, S., 11 Sep 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Gollmann, D. & Snekkens, E. (eds.). Springer, Vol. Part I. p. 1-10 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
9 Citations (Scopus)
89 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 3 Nov 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
3 Downloads (Pure)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017. New York: Association for Computing Machinery, Inc, p. 23-26 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

μShield: configurable code-reuse attacks mitigation for embedded systems

Abbasi, A., Wetzels, A. L. G. M., Bokslag, W., Zambon, E. & Etalle, S., 1 Jan 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Dordrecht: Springer, p. 694-709 16 p. (Lecture Notes in Computer Science (LNCS); vol. 10394).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

3 Citations (Scopus)
2016

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016.

Research output: Contribution to conferencePosterAcademic

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, p. 2063-2070

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)
18 Downloads (Pure)

Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

Abbasi, A., Hashemi, M., Zambon, E. & Etalle, S., 10 Oct 2016, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Dordrecht: Springer, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

39 Citations (Scopus)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 Nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, p. 509-520

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)
2015

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
54 Downloads (Pure)

Experimental validation of a risk assessment method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 2015, Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings). Fricker, S. A. & Schneider, K. (eds.). Springer, p. 1-16 (Lecture Notes in Computer Science; vol. 9013).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R., 1 Jan 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. (ed.). Information Systems for Crisis Response and Management (ISCRAM)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
2014

GEM : a distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., 2014, In : Theory and Practice of Logic Programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)
2 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
5 Downloads (Pure)

On emulation-based network intrusion detection systems

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E. & Etalle, S., 2014, Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings). Stavrou, A., Bos, H. & Portokalidis, G. (eds.). Berlin: Springer, p. 384-404 (Lecture Notes in Computer Science; vol. 8688).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Understanding computer security

Etalle, S. & Zannone, N., 1 Jan 2014, In : Frontiers in ICT. 1, 3, p. 1-2 2 p., 3.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
72 Downloads (Pure)
2013

A semantic security framework for systems of systems

Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J. & Etalle, S., 2013, In : International Journal of Cooperative Information Systems. 22, 1, p. 1350004/1-35

Research output: Contribution to journalArticleAcademicpeer-review

17 Citations (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2 Downloads (Pure)

Hybrid static-runtime information flow and declassification enforcement

Pontes Soares Rocha, B., Conti, M., Etalle, S. & Crispo, B., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 8, p. 1294-1305

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
1 Downloads (Pure)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (eds.). Berlin: Springer, p. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Policy administration in tag-based authorization

Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D. & Zannone, N., 2013, Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers). Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A. & Tawbi, N. (eds.). Berlin: Springer, p. 162-179 (Lecture Notes in Computer Science; vol. 7743).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
3 Downloads (Pure)

The POLIPO security framework

Trivellato, D., Etalle, S., Luit, E. J. & Zannone, N., 2013, Situation Awareness with Systems of Systems. Laar, van de, P., Tretmans, J. & Borth, M. (eds.). New York: Springer, p. 189-208 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

4 Downloads (Pure)
2012

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2012, In : International Journal of Network Management. 22, 2, p. 104-130

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., 2012, Proceedings of the IEEE Workshop on Complexity in Engineering (COMPENG'12, Aachen, Germany, June 11-13, 2012). Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 6242970

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Design and initial validation of the Raster method for telecom service availability risk assessment

Vriezekolk, E., Wieringa, R. & Etalle, S., 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Rothkrantz, L., Ristvej, J. & Franco, Z. (eds.). Vancouver: Simon Fraser University, p. 1-10

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Formal Aspects of Security and Trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers

Barthe, G. (ed.), Datta, A. (ed.) & Etalle, S. (ed.), 2012, Berlin: Springer. (Lecture notes in computer science; vol. 7140)

Research output: Book/ReportBook editingAcademic

How to assess telecom service availability risks for crisis organisations?

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2012, Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011). Berenguer, C., Grall, A. & Guedes Soares, C. (eds.). CRC Press, p. 2653-2661

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols

Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E. & Etalle, S., 2012, Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings). Balzarotti, D., Stolfo, S. J. & Cova, M. (eds.). Berlin: Springer, p. 354-373 (Lecture Notes in Computer Science; vol. 7462).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

53 Citations (Scopus)
2 Downloads (Pure)

Preface

Barthe, G., Datta, A. & Etalle, S., 23 Jul 2012, Formal aspects of security and trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Barthe, G., Datta, A. & Etalle, S. (eds.). Berlin: Springer, p. IV 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7140).

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Risk and business goal based security requirement and countermeasure prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2012, Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers). Niedrite, L., Strazdina, R. & Wangler, B. (eds.). Berlin: Springer, p. 64-76 (Lecture Notes in Business Information Processing; vol. 106).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
2011

A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

Bolzoni, D., Schade, C. L. & Etalle, S., 2011, Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011). Usenix Association, p. 201-215

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A new method to assess telecom service availability risks

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2011, Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011). Lisbon: Information Systems for Crisis Response and Management (ISCRAM), p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Citations (Scopus)
40 Downloads (Pure)

A security framework for systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings 12th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2011, Pisa, Italy, June 6-8, 2011). IEEE Computer Society, p. 182-183

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
79 Downloads (Pure)

Formal aspects of security and trust : 7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers

Degano, P. (ed.), Etalle, S. (ed.) & Guttman, J. (ed.), 2011, Berlin: Springer. (Lecture notes in computer science; vol. 6561)

Research output: Book/ReportBook editingAcademic

MELISSA: Towards automated detection of undesirable user actions in critical infrastructures

Hadziosmanovic, D., Bolzoni, D., Hartel, P. H. & Etalle, S., 2011, Proceedings of the European Conference on Computer Network Defense (EC2ND, Gothenburg, Sweden, September 6-7, 2011). IEEE Computer Society, p. 41-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
105 Downloads (Pure)

Model-based qualitative risk assessment for availability of IT infrastructures

Zambon, E., Etalle, S., Wieringa, R. J. & Hartel, P. H., 2011, In : Software and Systems Modeling. 10, 4, p. 553-580 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

24 Citations (Scopus)

Preface of special issue on "Computer security : foundations and automated reasoning"

Bauer, L., Etalle, S., Hartog, den, J. I. & Viganò, L., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 223-224 2 p.

Research output: Contribution to journalEditorialAcademicpeer-review

Protecting information in systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11, Chicago IL, USA, October 17-21, 2011). Association for Computing Machinery, Inc, p. 865-867

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)

RiskREP : risk-based security requirements elicitation and prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2011, Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011). Riga: Riga Technical University, p. 155-162

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2010

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Enschede: Universiteit Twente. (CTIT Technical Report; vol. TR-CTIT-10-20)

Research output: Book/ReportReportAcademic