Damiano Bolzoni
Affiliations:- University of Twente, Enschede, Netherlands
According to our database1,
Damiano Bolzoni
authored at least 20 papers
between 2005 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
1
2
1
1
1
2
2
1
1
1
4
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2016
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2012
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Complexity in Engineering, 2012
2011
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks.
Proceedings of the Past, 2011
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
2007
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services.
Proceedings of the First International Conference on Emerging Security Information, 2007
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007
Specifying Information Security Needs for the Delivery of High Quality Security Services.
Proceedings of BDIM 2007, 2007
2006
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
CoRR, 2006
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006
Proceedings of the 11th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2006
2005