• 1651 Citaten
1992 …2019
Als u wijzigingen in Pure hebt gemaakt, zullen deze hier binnenkort zichtbaar zijn.

Onderzoeksoutput 1992 2019

2019

A survey of network intrusion detection systems for controller area network

Dupont, G., den Hartog, J., Etalle, S. & Lekidis, A., sep 2019, 2019 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2019. Piscataway: Institute of Electrical and Electronics Engineers, 6 blz. 8906465

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Controllers
Network security
1 Downloads (Pure)

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, A., Wetzels, J., Holz, T. & Etalle, S., 1 jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Piscataway: Institute of Electrical and Electronics Engineers, blz. 31-46 16 blz. 8806725

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Embedded systems
vulnerability
Armor
Data storage equipment
corruption
110 Downloads (Pure)

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

Cappers, B. C. M., Meessen, P. N., Etalle, S. & Van Wijk, J. J., 9 mei 2019, 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018. Trent, S., Kohlhammer, J., Sauer, G., Gove, R., Best, D., Paul, C. L., Prigent, N. & Staheli, D. (redactie). Institute of Electrical and Electronics Engineers, 8 blz. 8709230

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Reverse engineering
Data visualization
Data reduction
Agglomeration
Personnel
2 Citaties (Scopus)
2 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (redactie). Springer, blz. 113-125 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics
1 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R. & Almgren, M. (redactie). Cham: Springer, blz. 461-481 21 blz. (Lecture Notes in Computer Science; vol. 11543).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Situational Awareness
Anomaly Detection
Intrusion detection
Network protocols
2018
4 Citaties (Scopus)

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, blz. 1637-1646 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Glass
89 Downloads (Pure)

Eventpad : a visual analytics approach to network intrusion detection and reverse engineering

Cappers, B. C. M., van Wijk, J. J. & Etalle, S., 23 apr 2018, European Cyper Security Perspectives 2018. Den Haag: KPN, blz. 62-65 4 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukProfessioneel

Open Access
Bestand
Reverse engineering
Intrusion detection
2017
14 Citaties (Scopus)
9 Downloads (Pure)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, blz. 27-46

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Agglomeration
Neural networks
Feedback
Industry
8 Citaties (Scopus)
69 Downloads (Pure)

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 4 dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, 4-8 December 2017, Orlando, Florida. New York: Association for Computing Machinery, Inc, blz. 437-448 12 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Programmable logic controllers
Flow control
Critical infrastructures
Embedded systems
Data storage equipment
1 Citaat (Scopus)
4 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, blz. 289-294 6 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Cryptography
Control systems
Telecommunication networks
6 Citaties (Scopus)
78 Downloads (Pure)

From intrusion detection to software design

Etalle, S., 11 sep 2017, Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security. Foley, S., Gollmann, D. & Snekkens, E. (redactie). Springer, Vol. Part I. blz. 1-10 10 blz. (Lecture Notes in Computer Science; vol. 10492).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Bestand
Intrusion detection
Software design
6 Citaties (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, blz. 13-24 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
1 Citaat (Scopus)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, blz. 23-26

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Game theory
3 Citaties (Scopus)

μShield: configurable code-reuse attacks mitigation for embedded systems

Abbasi, A., Wetzels, A. L. G. M., Bokslag, W., Zambon, E. & Etalle, S., 2017, Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (redactie). Dordrecht: Springer, blz. 694-709 16 blz. (Lecture Notes in Computer Science (LNCS); vol. 10394).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademicpeer review

Embedded systems
Computer systems
Hardware
Data storage equipment
2016
10 Citaties (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, blz. 324-333 10 blz. 7527785

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Loss prevention
Engines
Feedback

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016.

Onderzoeksoutput: Bijdrage aan congresPoster

13 Citaties (Scopus)
18 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, blz. 2063-2070

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Control systems
Telecommunication networks
Semantics
29 Citaties (Scopus)

Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

Abbasi, A., Hashemi, M., Zambon, E. & Etalle, S., 10 okt 2016, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (redactie). Dordrecht: Springer, blz. 1-12 12 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Programmable Logic Controller
Programmable logic controllers
Exploitation
Manipulation
Critical infrastructures
4 Citaties (Scopus)
4 Downloads (Pure)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, blz. 509-520

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Feature extraction
Experiments
2015
50 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). blz. 1-23

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Compliance
Industry
2 Citaties (Scopus)

Experimental validation of a risk assessment method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 2015, Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings). Fricker, S. A. & Schneider, K. (redactie). Springer, blz. 1-16 (Lecture Notes in Computer Science; vol. 9013).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Requirements engineering
Telecommunication
Availability
Experiments
1 Citaat (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R., 1 jan 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. (redactie). Information Systems for Crisis Response and Management (ISCRAM)

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Telecommunication services
Information systems
Experiments
2014
13 Citaties (Scopus)
2 Downloads (Pure)

GEM : a distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., 2014, In : Theory and Practice of Logic Programming. 14, 3, blz. 293-337 45 blz.

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Air cushion vehicles
Trust Management
Evaluation
Confidentiality
Termination
10 Citaties (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (redactie). Springer, blz. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Industry
7 Citaties (Scopus)

On emulation-based network intrusion detection systems

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E. & Etalle, S., 2014, Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings). Stavrou, A., Bos, H. & Portokalidis, G. (redactie). Berlin: Springer, blz. 384-404 (Lecture Notes in Computer Science; vol. 8688).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Packet networks
Polymorphism
1 Citaat (Scopus)
60 Downloads (Pure)

Understanding computer security

Etalle, S. & Zannone, N., 1 jan 2014, In : Frontiers in ICT. 1, 3, blz. 1-2 2 blz., 3.

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Open Access
Bestand
Monitoring
Accountability
Privacy
Economics
Computer security
2013
17 Citaties (Scopus)
2 Downloads (Pure)

A semantic security framework for systems of systems

Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J. & Etalle, S., 2013, In : International Journal of Cooperative Information Systems. 22, 1, blz. 1350004/1-35

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Semantics
Interoperability
Ontology
Access control
Scalability
9 Citaties (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., blz. 603-608

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Monitoring
21 Citaties (Scopus)
1 Downloads (Pure)

Hybrid static-runtime information flow and declassification enforcement

Pontes Soares Rocha, B., Conti, M., Etalle, S. & Crispo, B., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 8, blz. 1294-1305

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Security of data
Static analysis
Flow control
Access control
Mobile devices
8 Citaties (Scopus)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (redactie). Berlin: Springer, blz. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

privacy
voting
event
lack
literature
1 Citaat (Scopus)
3 Downloads (Pure)

Policy administration in tag-based authorization

Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D. & Zannone, N., 2013, Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers). Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A. & Tawbi, N. (redactie). Berlin: Springer, blz. 162-179 (Lecture Notes in Computer Science; vol. 7743).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

authorization
administrative policy
logic
writer
lack
4 Downloads (Pure)

The POLIPO security framework

Trivellato, D., Etalle, S., Luit, E. J. & Zannone, N., 2013, Situation Awareness with Systems of Systems. Laar, van de, P., Tretmans, J. & Borth, M. (redactie). New York: Springer, blz. 189-208 20 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademicpeer review

Interoperability
Ontology
Semantics
Access control
Scalability
2012
3 Citaties (Scopus)

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2012, In : International Journal of Network Management. 22, 2, blz. 104-130

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Information technology
Availability
Customer satisfaction
Managers
Costs
20 Citaties (Scopus)

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., 2012, Proceedings of the IEEE Workshop on Complexity in Engineering (COMPENG'12, Aachen, Germany, June 11-13, 2012). Piscataway: Institute of Electrical and Electronics Engineers, 6 blz. 6242970

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Control systems
Monitoring
2 Citaties (Scopus)

Design and initial validation of the Raster method for telecom service availability risk assessment

Vriezekolk, E., Wieringa, R. & Etalle, S., 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Rothkrantz, L., Ristvej, J. & Franco, Z. (redactie). Vancouver: Simon Fraser University, blz. 1-10

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Availability
Telecommunication services

Formal Aspects of Security and Trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers

Barthe, G. (redactie), Datta, A. (redactie) & Etalle, S. (redactie), 2012, Berlin: Springer. (Lecture notes in computer science; vol. 7140)

Onderzoeksoutput: Boek/rapportBoekredactieAcademic

Belgium
1 Citaat (Scopus)

How to assess telecom service availability risks for crisis organisations?

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2012, Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011). Berenguer, C., Grall, A. & Guedes Soares, C. (redactie). CRC Press, blz. 2653-2661

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Telecom
Risk assessment
Factors
Social factors
Risk factors
50 Citaties (Scopus)
2 Downloads (Pure)

N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols

Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E. & Etalle, S., 2012, Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings). Balzarotti, D., Stolfo, S. J. & Cova, M. (redactie). Berlin: Springer, blz. 354-373 (Lecture Notes in Computer Science; vol. 7462).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Electric network analysis
Intrusion detection
Inspection

Preface

Barthe, G., Datta, A. & Etalle, S., 23 jul 2012, Formal aspects of security and trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Barthe, G., Datta, A. & Etalle, S. (redactie). Berlin: Springer, blz. IV 1 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7140).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureVoorwoord / nawoordAcademic

5 Citaties (Scopus)

Risk and business goal based security requirement and countermeasure prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2012, Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers). Niedrite, L., Strazdina, R. & Wangler, B. (redactie). Berlin: Springer, blz. 64-76 (Lecture Notes in Business Information Processing; vol. 106).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Industry
Requirements engineering
Risk assessment
Specifications
2011

A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

Bolzoni, D., Schade, C. L. & Etalle, S., 2011, Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011). Usenix Association, blz. 201-215

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Engines
Malware
7 Citaties (Scopus)
38 Downloads (Pure)

A new method to assess telecom service availability risks

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2011, Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011). Lisbon: Information Systems for Crisis Response and Management (ISCRAM), blz. 1-5

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
telecommunication
crisis management
risk assessment
assessment method
disaster
6 Citaties (Scopus)
71 Downloads (Pure)

A security framework for systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings 12th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2011, Pisa, Italy, June 6-8, 2011). IEEE Computer Society, blz. 182-183

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Interoperability
Scalability
System of systems

Formal aspects of security and trust : 7th international workshop, FAST 2010, Pisa, Italy, September 16-17, 2010 : revised selected papers

Degano, P. (redactie), Etalle, S. (redactie) & Guttman, J. (redactie), 2011, Berlin: Springer. (Lecture notes in computer science; vol. 6561)

Onderzoeksoutput: Boek/rapportBoekredactieAcademic

Italy
privacy
data protection
information flow
interaction
12 Citaties (Scopus)
93 Downloads (Pure)

MELISSA: Towards automated detection of undesirable user actions in critical infrastructures

Hadziosmanovic, D., Bolzoni, D., Hartel, P. H. & Etalle, S., 2011, Proceedings of the European Conference on Computer Network Defense (EC2ND, Gothenburg, Sweden, September 6-7, 2011). IEEE Computer Society, blz. 41-48

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Critical infrastructures
Process control
Control systems
21 Citaties (Scopus)

Model-based qualitative risk assessment for availability of IT infrastructures

Zambon, E., Etalle, S., Wieringa, R. J. & Hartel, P. H., 2011, In : Software and Systems Modeling. 10, 4, blz. 553-580 28 blz.

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

Risk Assessment
Risk assessment
Availability
Infrastructure
Model-based

Preface of special issue on "Computer security : foundations and automated reasoning"

Bauer, L., Etalle, S., Hartog, den, J. I. & Viganò, L., 2011, In : Journal of Automated Reasoning. 46, 3-4, blz. 223-224 2 blz.

Onderzoeksoutput: Bijdrage aan tijdschriftEditorialAcademicpeer review

Security of data
4 Citaties (Scopus)
4 Downloads (Pure)

Protecting information in systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11, Chicago IL, USA, October 17-21, 2011). Association for Computing Machinery, Inc, blz. 865-867

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Access control
Interoperability
Ontology
Scalability
Computer systems

RiskREP : risk-based security requirements elicitation and prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2011, Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011). Riga: Riga Technical University, blz. 155-162

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Industry
Costs
2010

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Enschede: Universiteit Twente. (CTIT Technical Report; vol. TR-CTIT-10-20)

Onderzoeksoutput: Boek/rapportRapportAcademic

IT services
Costs
Customer satisfaction
Optimal solution
Organization size