Poseidon: a 2-tier anomaly-based network intrusion detection system D Bolzoni, S Etalle, P Hartel Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006 | 155 | 2006 |
Through the eye of the PLC: semantic security monitoring for industrial processes D Hadžiosmanović, R Sommer, E Zambon, PH Hartel Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 152 | 2014 |
Sequence-aware intrusion detection in industrial control systems M Caselli, E Zambon, F Kargl Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 13-24, 2015 | 147 | 2015 |
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle International Workshop on Recent Advances in Intrusion Detection, 354-373, 2012 | 97 | 2012 |
Model-based qualitative risk assessment for availability of IT infrastructures E Zambon, S Etalle, RJ Wieringa, P Hartel Software & Systems Modeling 10 (4), 553-580, 2011 | 53 | 2011 |
Specification mining for intrusion detection in networked control systems M Caselli, E Zambon, J Amann, R Sommer, F Kargl 25th {USENIX} Security Symposium ({USENIX} Security 16), 791-806, 2016 | 40 | 2016 |
A model supporting business continuity auditing and planning in information systems E Zambon, D Bolzoni, S Etalle, M Salvato Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007 | 32 | 2007 |
POPCORN: privacy-preserving charging for eMobility C Höfer, J Petit, R Schmidt, F Kargl Proceedings of the 2013 ACM workshop on Security, privacy & dependability …, 2013 | 30 | 2013 |
ECFI: Asynchronous control flow integrity for programmable logic controllers A Abbasi, T Holz, E Zambon, S Etalle Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 26 | 2017 |
Model-based mitigation of availability risks E Zambon, D Bolzoni, S Etalle, M Salvato 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007 | 24 | 2007 |
On the feasibility of device fingerprinting in industrial control systems M Caselli, D Hadžiosmanović, E Zambon, F Kargl International Workshop on Critical Information Infrastructures Security, 155-166, 2013 | 21 | 2013 |
Modeling message sequences for intrusion detection in industrial control systems M Caselli, E Zambon, J Petit, F Kargl International Conference on Critical Infrastructure Protection, 49-71, 2015 | 20 | 2015 |
Through the eye of the PLC: towards semantic security monitoring for industrial control systems D Hadziosmanovic, R Sommer, E Zambon, P Hartel Proc. ACSAC 14, 22, 2014 | 19 | 2014 |
On emulation-based network intrusion detection systems A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle International Workshop on Recent Advances in Intrusion Detection, 384-404, 2014 | 16 | 2014 |
It confidentiality risk assessment for an architecture-based approach A Morali, E Zambon, S Etalle, PL Overbeek 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management …, 2008 | 12 | 2008 |
Encryption in ICS networks: A blessing or a curse? D Fauri, B de Wijs, J den Hartog, E Costante, E Zambon, S Etalle 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 8 | 2017 |
Method and system for classifying a protocol message in a data communication network E Zambon US Patent 9,628,497, 2017 | 8 | 2017 |
Self configuring deep protocol network whitelisting S Etalle, C Gregory, D Bolzoni, E Zambon Security Matters, 2013 | 7 | 2013 |
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection E Zambon, D Bolzoni Blackhat Conference, Las Vegas, NV. Retrieved from http://www. blackhat. com …, 2006 | 7 | 2006 |
Monitoring Industrial Control Systems to improve operations and security S Etalle, C Gregory, D Bolzoni, E Zambon, D Trivellato White Paper, Security Matters, 2013 | 5 | 2013 |