• 1651 Citaten
1992 …2019
Als u wijzigingen in Pure hebt gemaakt, zullen deze hier binnenkort zichtbaar zijn.

Onderzoeksoutput 1992 2019

Filter
Conferentiebijdrage
2019

A survey of network intrusion detection systems for controller area network

Dupont, G., den Hartog, J., Etalle, S. & Lekidis, A., sep 2019, 2019 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2019. Piscataway: Institute of Electrical and Electronics Engineers, 6 blz. 8906465

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Controllers
Network security
1 Downloads (Pure)

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, A., Wetzels, J., Holz, T. & Etalle, S., 1 jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Piscataway: Institute of Electrical and Electronics Engineers, blz. 31-46 16 blz. 8806725

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Embedded systems
vulnerability
Armor
Data storage equipment
corruption
110 Downloads (Pure)

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

Cappers, B. C. M., Meessen, P. N., Etalle, S. & Van Wijk, J. J., 9 mei 2019, 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018. Trent, S., Kohlhammer, J., Sauer, G., Gove, R., Best, D., Paul, C. L., Prigent, N. & Staheli, D. (redactie). Institute of Electrical and Electronics Engineers, 8 blz. 8709230

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Reverse engineering
Data visualization
Data reduction
Agglomeration
Personnel
2 Citaties (Scopus)
2 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (redactie). Springer, blz. 113-125 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics
1 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R. & Almgren, M. (redactie). Cham: Springer, blz. 461-481 21 blz. (Lecture Notes in Computer Science; vol. 11543).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intelligent buildings
Situational Awareness
Anomaly Detection
Intrusion detection
Network protocols
2018
4 Citaties (Scopus)

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, blz. 1637-1646 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Glass
2017
8 Citaties (Scopus)
69 Downloads (Pure)

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 4 dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, 4-8 December 2017, Orlando, Florida. New York: Association for Computing Machinery, Inc, blz. 437-448 12 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Programmable logic controllers
Flow control
Critical infrastructures
Embedded systems
Data storage equipment
1 Citaat (Scopus)
4 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, blz. 289-294 6 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Cryptography
Control systems
Telecommunication networks
6 Citaties (Scopus)
78 Downloads (Pure)

From intrusion detection to software design

Etalle, S., 11 sep 2017, Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security. Foley, S., Gollmann, D. & Snekkens, E. (redactie). Springer, Vol. Part I. blz. 1-10 10 blz. (Lecture Notes in Computer Science; vol. 10492).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Bestand
Intrusion detection
Software design
6 Citaties (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, blz. 13-24 10 blz.

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
1 Citaat (Scopus)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, blz. 23-26

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Game theory
2016
10 Citaties (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, blz. 324-333 10 blz. 7527785

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Loss prevention
Engines
Feedback
13 Citaties (Scopus)
18 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, blz. 2063-2070

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Control systems
Telecommunication networks
Semantics
29 Citaties (Scopus)

Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

Abbasi, A., Hashemi, M., Zambon, E. & Etalle, S., 10 okt 2016, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (redactie). Dordrecht: Springer, blz. 1-12 12 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Programmable Logic Controller
Programmable logic controllers
Exploitation
Manipulation
Critical infrastructures
4 Citaties (Scopus)
4 Downloads (Pure)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, blz. 509-520

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Feature extraction
Experiments
2015
50 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). blz. 1-23

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Compliance
Industry
2 Citaties (Scopus)

Experimental validation of a risk assessment method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 2015, Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings). Fricker, S. A. & Schneider, K. (redactie). Springer, blz. 1-16 (Lecture Notes in Computer Science; vol. 9013).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Requirements engineering
Telecommunication
Availability
Experiments
1 Citaat (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R., 1 jan 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. (redactie). Information Systems for Crisis Response and Management (ISCRAM)

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Telecommunication services
Information systems
Experiments
2014
10 Citaties (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (redactie). Springer, blz. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Industry
7 Citaties (Scopus)

On emulation-based network intrusion detection systems

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E. & Etalle, S., 2014, Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings). Stavrou, A., Bos, H. & Portokalidis, G. (redactie). Berlin: Springer, blz. 384-404 (Lecture Notes in Computer Science; vol. 8688).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Packet networks
Polymorphism
2013
9 Citaties (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., blz. 603-608

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Monitoring
8 Citaties (Scopus)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (redactie). Berlin: Springer, blz. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

privacy
voting
event
lack
literature
1 Citaat (Scopus)
3 Downloads (Pure)

Policy administration in tag-based authorization

Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D. & Zannone, N., 2013, Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers). Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A. & Tawbi, N. (redactie). Berlin: Springer, blz. 162-179 (Lecture Notes in Computer Science; vol. 7743).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

authorization
administrative policy
logic
writer
lack
2012
20 Citaties (Scopus)

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., 2012, Proceedings of the IEEE Workshop on Complexity in Engineering (COMPENG'12, Aachen, Germany, June 11-13, 2012). Piscataway: Institute of Electrical and Electronics Engineers, 6 blz. 6242970

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Control systems
Monitoring
2 Citaties (Scopus)

Design and initial validation of the Raster method for telecom service availability risk assessment

Vriezekolk, E., Wieringa, R. & Etalle, S., 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Rothkrantz, L., Ristvej, J. & Franco, Z. (redactie). Vancouver: Simon Fraser University, blz. 1-10

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Availability
Telecommunication services
1 Citaat (Scopus)

How to assess telecom service availability risks for crisis organisations?

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2012, Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011). Berenguer, C., Grall, A. & Guedes Soares, C. (redactie). CRC Press, blz. 2653-2661

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Telecom
Risk assessment
Factors
Social factors
Risk factors
50 Citaties (Scopus)
2 Downloads (Pure)

N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols

Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E. & Etalle, S., 2012, Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings). Balzarotti, D., Stolfo, S. J. & Cova, M. (redactie). Berlin: Springer, blz. 354-373 (Lecture Notes in Computer Science; vol. 7462).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Electric network analysis
Intrusion detection
Inspection
5 Citaties (Scopus)

Risk and business goal based security requirement and countermeasure prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2012, Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers). Niedrite, L., Strazdina, R. & Wangler, B. (redactie). Berlin: Springer, blz. 64-76 (Lecture Notes in Business Information Processing; vol. 106).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Industry
Requirements engineering
Risk assessment
Specifications
2011

A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

Bolzoni, D., Schade, C. L. & Etalle, S., 2011, Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011). Usenix Association, blz. 201-215

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Engines
Malware
7 Citaties (Scopus)
38 Downloads (Pure)

A new method to assess telecom service availability risks

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2011, Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011). Lisbon: Information Systems for Crisis Response and Management (ISCRAM), blz. 1-5

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
telecommunication
crisis management
risk assessment
assessment method
disaster
6 Citaties (Scopus)
71 Downloads (Pure)

A security framework for systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings 12th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2011, Pisa, Italy, June 6-8, 2011). IEEE Computer Society, blz. 182-183

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Interoperability
Scalability
System of systems
12 Citaties (Scopus)
93 Downloads (Pure)

MELISSA: Towards automated detection of undesirable user actions in critical infrastructures

Hadziosmanovic, D., Bolzoni, D., Hartel, P. H. & Etalle, S., 2011, Proceedings of the European Conference on Computer Network Defense (EC2ND, Gothenburg, Sweden, September 6-7, 2011). IEEE Computer Society, blz. 41-48

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Critical infrastructures
Process control
Control systems
4 Citaties (Scopus)
4 Downloads (Pure)

Protecting information in systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11, Chicago IL, USA, October 17-21, 2011). Association for Computing Machinery, Inc, blz. 865-867

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Access control
Interoperability
Ontology
Scalability
Computer systems

RiskREP : risk-based security requirements elicitation and prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2011, Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011). Riga: Riga Technical University, blz. 155-162

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Industry
Costs
2010
1 Citaat (Scopus)

CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

Morali, A., Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010). Institute of Electrical and Electronics Engineers, blz. 322-325

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk analysis
Outsourcing
Industry

LP with flexible grouping and aggregates using modes

Czenko, M. & Etalle, S., 2010, Proceedings of the 19th International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR 2009), 9-11 September 2009, Coimbra, Portugal. De Schreye, D. (redactie). Berlin: Springer, blz. 67-81 (Lecture Notes in Computer Science; vol. 6037).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

semantics
retaining
logic
proposals
occurrences
2 Citaties (Scopus)
61 Downloads (Pure)

Towards data protection compliance

Zannone, N., Petkovic, M. & Etalle, S., 2010, SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010). INSTICC Press, blz. 213-216

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
Data protection
Privacy
Integral
Organizational processes
10 Citaties (Scopus)

Towards static flow-based declassification for legacy and untrusted programs

Pontes Soares Rocha, B., Bandhakavi, S., Hartog, den, J. I., Winsborough, W. H. & Etalle, S., 2010, Proceedings IEEE Symposium on Security and Privacy (SP, Oakland CA, USA, May 16-19, 2010). Institute of Electrical and Electronics Engineers, blz. 93-108

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Static analysis
2009
1 Citaat (Scopus)

Extended eTVRA vs. security checklist: Experiences in a value-web

Morali, A., Zambon, E., Houmb, S. H., Sallhammar, K. & Etalle, S., 2009, Proceedings 31st International Conference on Software Engineering (ICSE'09, Vancouver, Canada, May 16-24, 2009). IEEE Computer Society, blz. 130-140

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Telecommunication
Risk analysis
Risk management
Industry
Hardware
1 Citaat (Scopus)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (redactie). Berlin: Springer, blz. 129-142 (Lecture Notes in Computer Science; vol. 5491).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

19 Citaties (Scopus)

Panacea: automating attack classification for anomaly-based network intrusion detection systems

Bolzoni, D., Etalle, S. & Hartel, P. H., 2009, Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Kirda, E., Jha, S. & Balzarotti, D. (redactie). Berlin: Springer, blz. 1-20 20 blz. (Lecture Notes in Computer Science (LNCS); vol. 5758).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
11 Citaties (Scopus)
2 Downloads (Pure)

POLIPO : Policies & ontologies for interoperability, portability, and autonomy

Trivellato, D., Spiessens, A. O. D., Zannone, N. & Etalle, S., 2009, Proceedings IEEE International Symposium on Policies for Distributed Systems and Networks (London, UK, July 20-22, 2009). Institute of Electrical and Electronics Engineers, blz. 110-113

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Access control
Interoperability
Ontology
Semantics
10 Citaties (Scopus)
3 Downloads (Pure)

Reputation-based ontology alignment for autonomy and interoperability in distributed access control

Trivellato, D., Spiessens, A. O. D., Zannone, N. & Etalle, S., 2009, Proceedings 12th IEEE International Conference on Computational Science and Engineering (CSE'09, Vancouver BC, Canada, August 29-31, 2009). Institute of Electrical and Electronics Engineers, Vol. 3. blz. 252-258

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Access control
Interoperability
Ontology
Semantics
2008
3 Citaties (Scopus)
2 Downloads (Pure)

Boosting web intrusion detection systems by inferring positive signatures

Bolzoni, D. & Etalle, S., 2008, On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II. Meersman, R. & Tari, Z. (redactie). Berlin: Springer, blz. 938-955 (Lecture Notes in Computer Science; vol. 5332).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Intrusion detection
Formal languages
2 Citaties (Scopus)
1 Downloads (Pure)

IT confidentiality risk assessment for an architecture-based approach

Morali, A., Zambon, E., Etalle, S. & Overbeek, P. L., 2008, Proceedings 3rd IEEE/IFIP International Workshop on Business-driven IT Management (BDIM 2008, Salvador, Brazil, April 7, 2008). Bartolini, C., Sahai, A. & Sauvé, J. P. (redactie). Institute of Electrical and Electronics Engineers, blz. 31-40

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Risk assessment
Information systems
Industry
12 Citaties (Scopus)

RBAC administration in distributed systems

Dekker, M. A. C., Crampton, J. & Etalle, S., 2008, SACMAT 2008 (13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings). Ray, I. & Li, N. (redactie). New York: Association for Computing Machinery, Inc, blz. 93-102

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Access control
Control systems
Health care
Availability
6 Citaties (Scopus)

Trust management in P2P systems using standard TuLiP

Czenko, M., Doumen, J. M. & Etalle, S., 2008, Trust Management II (Proceedings of IFIPTM2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, Trondheim, Norway, June 18-20, 2008). Karabulut, Y., Mitchell, J. C., Herrmann, P. & Jensen, C. D. (redactie). Berlin: Springer, blz. 1-16 (IFIP Conference Proceedings; vol. 263).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Acoustic waves
2007
10 Citaties (Scopus)
3 Downloads (Pure)

A model supporting business continuity auditing and planning in information systems

Zambon, E., Bolzoni, D., Etalle, S. & Salvato, M., 2007, Proceedings of the 2nd International Conference on Internet Monitoring and Protection (ICIMP2007) 1 - 5 July 2007, San Jose, California, USA. Los Alamitos, California, USA: Institute of Electrical and Electronics Engineers, blz. 33-33

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Information systems
Planning
Industry
Risk assessment
Availability
7 Citaties (Scopus)
81 Downloads (Pure)

An introduction to the role based trust management framework RT

Czenko, M., Etalle, S., Li, D. & Winsborough, W. H., 2007, Foundations of Security Analysis and Design IV (FOSAD 2006/2007 Tutorial Lectures). Aldini, A. & Gorrieri, R. (redactie). Berlin: Springer, blz. 246-281 (Lecture Notes in Computer Science; vol. 4677).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
Access control
Semantics
39 Citaties (Scopus)
1 Downloads (Pure)

A posteriori compliance control

Etalle, S. & Winsborough, W. H., 2007, Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007) 20-22 June 2007, Sophia Antipolis, France. New York, New York: Association for Computing Machinery, Inc, blz. 11-20

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Compliance control