Giuseppe Settanni

According to our database1, Giuseppe Settanni authored at least 21 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Big Data for Cybersecurity.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

2018
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotechnik und Informationstechnik, 2018

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Computers & Security, 2018

Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.
Proceedings of the Information Security Practice and Experience, 2018

Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Sec. Appl., 2017

Improved software vulnerability patching techniques using CVSS and game theory.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Acquiring Cyber Threat Intelligence through Security Information Correlation.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Network security and anomaly detection with Big-DAMA, a big data analytics framework.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Computers & Security, 2016

Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Combating advanced persistent threats: From network event correlation to incident detection.
Computers & Security, 2015

A Blueprint for a Pan-European Cyber Incident Analysis System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Beyond gut instincts: Understanding, rating and comparing self-learning IDSs.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Semi-synthetic data set generation for security software evaluation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014


  Loading...