Damiano Bolzoni

Affiliations:
  • University of Twente, Enschede, Netherlands


According to our database1, Damiano Bolzoni authored at least 20 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
Indicators of Malicious SSL Connections.
Proceedings of the Network and System Security - 9th International Conference, 2015

2012
A log mining approach for process monitoring in SCADA.
Int. J. Inf. Sec., 2012

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Challenges and opportunities in securing industrial control systems.
Proceedings of the Complexity in Engineering, 2012

2011
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks.
Proceedings of the Past, 2011

MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

2010
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Revisiting Anomaly-based Network Intrusion Detection Systems.
PhD thesis, 2009

Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services.
Proceedings of the First International Conference on Emerging Security Information, 2007

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Model-Based Mitigation of Availability Risks.
Proceedings of BDIM 2007, 2007

Specifying Information Security Needs for the Delivery of High Quality Security Services.
Proceedings of BDIM 2007, 2007

2006
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
CoRR, 2006

A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
CoRR, 2006

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

A Business Goal Driven Approach for Information Security Requirements.
Proceedings of the 11th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2006

2005
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
CoRR, 2005


  Loading...