Elisa Costante

Affiliations:
  • Eindhoven University of Technology, Netherlands


According to our database1, Elisa Costante authored at least 21 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech., June, 2024

2023
Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Actionable Cyber Threat Intelligence for Automated Incident Response.
Proceedings of the Secure IT Systems, 2022

2021
Leveraging operational technology and the Internet of things to attack smart buildings.
J. Comput. Virol. Hacking Tech., 2021

Similarity-Based Clustering For IoT Device Classification.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
A Matter of Life and Death: Analyzing the Security of Healthcare Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

2019
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
A white-box anomaly-based framework for database leakage detection.
J. Inf. Secur. Appl., 2017

Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems.
Int. J. Crit. Infrastructures, 2017

Encryption in ICS networks: A blessing or a curse?
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

From System Specification to Anomaly Detection (and back).
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
A Hybrid Framework for Data Loss Prevention and Detection.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
Understanding Perceived Trust to Reduce Regret.
Comput. Intell., 2015

2014
Hunting the Unknown - White-Box Database Leakage Detection.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Privacy-Aware Web Service Composition and Ranking.
Int. J. Web Serv. Res., 2013

Database Anomalous Activities - Detection and Quantification.
Proceedings of the SECRYPT 2013, 2013

2012
A machine learning solution to assess privacy policy completeness: (short paper).
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

What Websites Know About You.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
On-line trust perception: What really matters.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

2008
A three-layered model to implement data privacy policies.
Comput. Stand. Interfaces, 2008


  Loading...