Marco Caselli

Orcid: 0000-0003-4883-797X

According to our database1, Marco Caselli authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fully autonomous tuning of a spin qubit.
CoRR, 2024

Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Inferring Recovery Steps from Cyber Threat Intelligence Reports.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2022
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Measuring and visualizing cyber threat intelligence quality.
Int. J. Inf. Sec., 2021

A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective.
IEEE Commun. Surv. Tutorials, 2021

BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports.
CoRR, 2020

Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impact.
Proceedings of the Computer Safety, Reliability, and Security, 2019

2018
Intrusion Detection for Sequence-Based Attacks with Reduced Traffic Models.
Proceedings of the Measurement, Modelling and Evaluation of Computing Systems, 2018

2017
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection IX, 2015

Sequence-aware Intrusion Detection in Industrial Control Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
A Security Assessment Methodology for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Measuring the global domain name system.
IEEE Netw., 2013

DNS as critical infrastructure, the energy system case study.
Int. J. Crit. Infrastructures, 2013

On the Feasibility of Device Fingerprinting in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Measuring Name System Health.
Proceedings of the Critical Infrastructure Protection VI, 2012


  Loading...