Daniel Ricardo dos Santos

Orcid: 0000-0002-7747-260X

Affiliations:
  • Technical University of Eindhoven, The Netherlands


According to our database1, Daniel Ricardo dos Santos authored at least 30 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Demonstration of new attacks on three healthcare network protocols in a lab environment.
J. Comput. Virol. Hacking Tech., June, 2024

2023
Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Insecure by Design in the Backbone of Critical Infrastructure.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing.
RFC, July, 2022

Actionable Cyber Threat Intelligence for Automated Incident Response.
Proceedings of the Secure IT Systems, 2022

2021
Leveraging operational technology and the Internet of things to attack smart buildings.
J. Comput. Virol. Hacking Tech., 2021

Similarity-Based Clustering For IoT Device Classification.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
A Matter of Life and Death: Analyzing the Security of Healthcare Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
TestREx: a framework for repeatable exploits.
Int. J. Softw. Tools Technol. Transf., 2019

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Automatic Techniques for the Synthesis and Assisted Deployment of Security Policies in Workflow-based Applications.
PhD thesis, 2017

Automatically finding execution scenarios to deploy security-sensitive workflows.
J. Comput. Secur., 2017

A Survey on Workflow Satisfiability, Resiliency, and Related Problems.
CoRR, 2017

On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

From System Specification to Anomaly Detection (and back).
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
A framework and risk assessment approaches for risk-based access control in the cloud.
J. Netw. Comput. Appl., 2016

Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2016

Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

2015
Modularity for Security-Sensitive Workflows.
CoRR, 2015

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A cyclical evaluation model of information security maturity.
Inf. Manag. Comput. Secur., 2014

Privacy-preserving identity federations in the cloud: a proof of concept.
Int. J. Secur. Networks, 2014

TESTREX: a Testbed for Repeatable Exploits.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

A dynamic risk-based access control architecture for cloud computing.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014


  Loading...