A Tale of Two Industroyers: It was the Season of Darkness
Salazar, Luis, Castro, Sebastian R., Lozano, Juan, Koneru, Keerthi, Zambon, Emmanuele, Huang, Bing, Baldick, Ross, Krotofil, Marina, Rojas, Alonso, Cardenas, Alvaro A.
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile
Kempinski, Stash, Sciancalepore, Savio, Zambon, Emmanuele, Allodi, Luca
Published in 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (08.07.2024)
Published in 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (08.07.2024)
Get full text
Conference Proceeding
Characterizing Building Automation System Attacks and Attackers
Tommasini, Martino, Rosso, Martin, Zambon, Emmanuele, Allodi, Luca, Hartog, Jerry den
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.06.2022)
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.06.2022)
Get full text
Conference Proceeding
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network
Qin, Xi, Rosso, Martin, Cardenas, Alvaro A., Etalle, Sandro, den Hartog, Jerry, Zambon, Emmanuele
Published in 2022 IEEE Security and Privacy Workshops (SPW) (01.05.2022)
Published in 2022 IEEE Security and Privacy Workshops (SPW) (01.05.2022)
Get full text
Conference Proceeding
Encryption in ICS networks: A blessing or a curse?
Fauri, Davide, de Wijs, Bart, den Hartog, Jerry, Costante, Elisa, Zambon, Emmanuele, Etalle, Sandro
Published in 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) (01.10.2017)
Published in 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) (01.10.2017)
Get full text
Conference Proceeding
Extended eTVRA vs. security checklist: Experiences in a value-web
Morali, A., Zambon, E., Houmb, S.H., Sallhammar, K., Etalle, S.
Published in 2009 31st International Conference on Software Engineering - Companion Volume (01.05.2009)
Published in 2009 31st International Conference on Software Engineering - Companion Volume (01.05.2009)
Get full text
Conference Proceeding
POSEIDON: a 2-tier anomaly-based network intrusion detection system
Bolzoni, D., Etalle, S., Hartel, P.
Published in Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Published in Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Get full text
Conference Proceeding
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Morali, A, Zambon, E, Etalle, S, Wieringa, R
Published in 2010 International Conference on Network and Service Management (01.10.2010)
Published in 2010 International Conference on Network and Service Management (01.10.2010)
Get full text
Conference Proceeding
A Model Supporting Business Continuity Auditing and Planning in Information Systems
Zambon, E., Bolzoni, D., Etalle, S., Salvato, M.
Published in Second International Conference on Internet Monitoring and Protection (ICIMP 2007) (01.07.2007)
Published in Second International Conference on Internet Monitoring and Protection (ICIMP 2007) (01.07.2007)
Get full text
Conference Proceeding
Model-Based Mitigation of Availability Risks
Zambon, E., Bolzoni, D., Etalle, S., Salvato, M.
Published in 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management (01.05.2007)
Published in 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management (01.05.2007)
Get full text
Conference Proceeding
IT confidentiality risk assessment for an architecture-based approach
Morali, A., Zambon, E., Etalle, S., Overbeek, P.L.
Published in 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management (01.04.2008)
Published in 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management (01.04.2008)
Get full text
Conference Proceeding