Sandro Etalle
Affiliations:- Eindhoven University of Technology, Netherlands
- University of Twente, Enschede, Netherlands
According to our database1,
Sandro Etalle
authored at least 144 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech., June, 2024
2022
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022
2021
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021
2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
2019
CoRR, 2019
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018
2017
J. Inf. Secur. Appl., 2017
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Reading between the fields: practical, effective intrusion detection for industrial control systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation.
Proceedings of the Critical Information Infrastructures Security, 2016
2015
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015
2014
Theory Pract. Log. Program., 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. Cooperative Inf. Syst., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Situation Awareness with Systems of Systems, 2013
2012
Int. J. Netw. Manag., 2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Design and initial validation ofthe Rastermethod for telecom service availability risk assessment.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Complexity in Engineering, 2012
2011
Softw. Syst. Model., 2011
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks.
Proceedings of the Past, 2011
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Workshops on Business Informatics Research, 2011
2010
J. Theor. Appl. Electron. Commer. Res., 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Towards Data Protection Compliance.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
Maintaining control while delegating trust: Integrity constraints in trust management.
ACM Trans. Inf. Syst. Secur., 2009
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Logic-Based Program Synthesis and Transformation, 2009
Proceedings of the 31st International Conference on Software Engineering, 2009
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Proceedings of BDIM 2008, 2008
2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007
Proceedings of the Logic Programming, 23rd International Conference, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems.
Theory Pract. Log. Program., 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Ann. des Télécommunications, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the Logic Programming, 21st International Conference, 2005
Service Brokerage in Prolog.
Proceedings of the ICEIS 2005, 2005
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005
2004
ACM Trans. Comput. Log., 2004
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Program Development in Computational Logic: A Decade of Research Advances in Logic-Based Program Development, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
Proceedings of the Construction and Analysis of Safe, 2004
2003
Proceedings of the International Workshop on Software Verification and Validation, 2003
Proceedings of the International Workshop on Software Verification and Validation, 2003
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003
Assessing Security in Energy-Efficient Sensor Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003
2002
Theory Pract. Log. Program., 2002
Proceedings of the Static Analysis, 9th International Symposium, 2002
Proceedings of the Computational Logic: Logic Programming and Beyond, 2002
2001
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols.
Proceedings of the Logic Based Program Synthesis and Transformation, 2001
Proceedings of the Programming Languages and Systems, 2001
2000
The lazy functional side of logic programming.
Proceedings of the Extended Abstracts of the 10th International Workshop on Logic-based Program Synthesis and Transformation, 2000
Proceedings of the Computational Logic, 2000
1999
Proceedings of the Workshop on Verification of Logic Programs 1999, 1999
Proceedings of the Logic Programming Synthesis and Transformation, 1999
Logic Programming with Requests.
Proceedings of the Logic Programming: The 1999 International Conference, Las Cruces, New Mexico, USA, November 29, 1999
The Replacement Operation for CCP Programs.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999
1998
Beyond Success and Failure.
Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming, 1998
Proceedings of the CONCUR '98: Concurrency Theory, 1998
1997
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997
1996
J. Funct. Log. Program., 1996
Proceedings of the Logic Programming, 1996
1995
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1995
Proceedings of the Logic Programming Synthesis and Transformation, 1995
A Transformation System for Modular CLP Programs.
Proceedings of the Logic Programming, 1995
1994
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics.
Proceedings of the Logic Programming Synthesis and Transformation, 1994
Modular Transformations of CLP Programs.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994
1993
Proceedings of the Mathematical Foundations of Computer Science 1993, 1993
1992
Proceedings of the Programming Language Implementation and Logic Programming, 1992
Proceedings of the Meta-Programming in Logic, 3rd International Workshop, 1992