Sandro Etalle
Sandro Etalle
TU Eindhoven and University of Twente
Vahvistettu sähköpostiosoite verkkotunnuksessa tue.nl - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003 …, 2003
2022003
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1612006
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6 (2), 133-151, 2007
1202007
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
International Static Analysis Symposium, 326-341, 2002
1202002
Transformations of CLP modules
S Etalle, M Gabrielli
Theoretical computer science 166 (1-2), 101-146, 1996
1101996
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
IFIP World Computer Congress, TC 1, 187-201, 2004
1052004
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
International Workshop on Recent Advances in Intrusion Detection, 354-373, 2012
1032012
A posteriori compliance control
S Etalle, WH Winsborough
Proceedings of the 12th ACM symposium on Access control models and …, 2007
892007
On the unification free Prolog programs
KR Apt, S Etalle
International Symposium on Mathematical Foundations of Computer Science, 1-19, 1993
881993
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
842005
Audit-based access control for electronic health records
MAC Dekker, S Etalle
Electronic Notes in Theoretical Computer Science 168, 221-236, 2007
782007
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
772005
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
IFIP International Conference on Personal Wireless Communications, 27-39, 2003
762003
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
752003
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
612006
Model-based qualitative risk assessment for availability of IT infrastructures
E Zambon, S Etalle, RJ Wieringa, P Hartel
Software & Systems Modeling 10 (4), 553-580, 2011
592011
Timed model checking of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
582004
Panacea: Automating attack classification for anomaly-based network intrusion detection systems
D Bolzoni, S Etalle, PH Hartel
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009
562009
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
TWENTE UNIV ENSCHEDE (NETHERLANDS) DEPT OF COMPUTER SCIENCE, 2003
522003
Assessing security-critical energy-efficient sensor networks
YW Law, S Dulman, S Etalle, P Havinga
University of Twente Technical Report TR-CTIT-2 18, 2002
502002
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20