Obserwuj
Emmanuele Zambon
Tytuł
Cytowane przez
Cytowane przez
Rok
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
2682014
Sequence-aware intrusion detection in industrial control systems
M Caselli, E Zambon, F Kargl
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 13-24, 2015
2232015
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1782006
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1252012
Model-based qualitative risk assessment for availability of IT infrastructures
E Zambon, S Etalle, RJ Wieringa, P Hartel
Software & Systems Modeling 10, 553-580, 2011
742011
Specification mining for intrusion detection in networked control systems
M Caselli, E Zambon, J Amann, R Sommer, F Kargl
25th USENIX security symposium (USENIX Security 16), 791-806, 2016
662016
ECFI: Asynchronous control flow integrity for programmable logic controllers
A Abbasi, T Holz, E Zambon, S Etalle
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
582017
On the feasibility of device fingerprinting in industrial control systems
M Caselli, D Hadžiosmanović, E Zambon, F Kargl
Critical Information Infrastructures Security: 8th International Workshop …, 2013
372013
Modeling message sequences for intrusion detection in industrial control systems
M Caselli, E Zambon, J Petit, F Kargl
Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015
342015
A model supporting business continuity auditing and planning in information systems
E Zambon, D Bolzoni, S Etalle, M Salvato
Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007
342007
On emulation-based network intrusion detection systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
312014
Encryption in ICS networks: A blessing or a curse?
D Fauri, B de Wijs, J den Hartog, E Costante, E Zambon, S Etalle
2017 IEEE International Conference on Smart Grid Communications …, 2017
292017
Model-based mitigation of availability risks
E Zambon, D Bolzoni, S Etalle, M Salvato
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
262007
Through the eye of the PLC: towards semantic security monitoring for industrial control systems
D Hadziosmanovic, R Sommer, E Zambon, P Hartel
Proc. ACSAC 14, 22, 2014
252014
Method and system for classifying a protocol message in a data communication network
E Zambon
US Patent 9,628,497, 2017
202017
Stealth low-level manipulation of programmable logic controllers i/o by pin control exploitation
A Abbasi, M Hashemi, E Zambon, S Etalle
Critical Information Infrastructures Security: 11th International Conference …, 2017
152017
System and Method for Detecting Anomalies in Electronic Documents
D Bolzoni, E Zambon
US Patent App. 13/824,211, 2014
142014
It confidentiality risk assessment for an architecture-based approach
A Morali, E Zambon, S Etalle, PL Overbeek
2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management …, 2008
132008
Self-configuring deep protocol network whitelisting
S Etalle, C Gregory, D Bolzoni, E Zambon
Security Matters, 2013
72013
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection
E Zambon, D Bolzoni
Retrieved September 19, 2020, 2006
72006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20