Follow
Damiano Bolzoni
Title
Cited by
Cited by
Year
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1792006
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1262012
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11, 231-251, 2012
1032012
Panacea: Automating attack classification for anomaly-based network intrusion detection systems
D Bolzoni, S Etalle, PH Hartel
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009
652009
Challenges and opportunities in securing industrial control systems
D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel
2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012
452012
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
D Bolzoni, B Crispo, S Etalle
LISA 7, 1-12, 2007
382007
Revisiting anomaly-based network intrusion detection systems
D Bolzoni
342009
A model supporting business continuity auditing and planning in information systems
E Zambon, D Bolzoni, S Etalle, M Salvato
Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007
342007
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures
D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle
2011 Seventh European Conference on Computer Network Defense, 41-48, 2011
302011
Boosting web intrusion detection systems by inferring positive signatures
D Bolzoni, S Etalle
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
272008
Approaches in anomaly-based network intrusion detection systems
D Bolzoni, S Etalle
Intrusion Detection Systems 38, 1-15, 2008
262008
Model-based mitigation of availability risks
E Zambon, D Bolzoni, S Etalle, M Salvato
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
262007
Method and system for alert classification in a computer network
D Bolzoni, S Etalle
US Patent 9,191,398, 2015
162015
System and Method for Detecting Anomalies in Electronic Documents
D Bolzoni, E Zambon
US Patent App. 13/824,211, 2014
122014
Indicators of malicious SSL connections
R Bortolameotti, A Peter, MH Everts, D Bolzoni
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
92015
Situational Awareness Network for the electric power system: The architecture and testing metrics
D Bolzoni, R Leszczyna, MR Wróbel
2016 Federated Conference on Computer Science and Information Systems …, 2016
82016
Self-configuring deep protocol network whitelisting
S Etalle, C Gregory, D Bolzoni, E Zambon
Security Matters, 2013
72013
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection
E Zambon, D Bolzoni
Retrieved September 19, 2020, 2006
72006
Understanding and specifying information security needs to support the delivery of high quality security services
X Su, D Bolzoni, P Van Eck
The International Conference on Emerging Security Information, Systems, and …, 2007
62007
A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks
D Bolzoni, C Schade, S Etalle
25th Large Installation System Administration Conference (LISA 11), 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20