A Tale of Two Industroyers: It was the Season of Darkness
Salazar, Luis, Castro, Sebastian R., Lozano, Juan, Koneru, Keerthi, Zambon, Emmanuele, Huang, Bing, Baldick, Ross, Krotofil, Marina, Rojas, Alonso, Cardenas, Alvaro A.
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Model-based qualitative risk assessment for availability of IT infrastructures
Zambon, Emmanuele, Etalle, Sandro, Wieringa, Roel J., Hartel, Pieter
Published in Software and systems modeling (01.10.2011)
Published in Software and systems modeling (01.10.2011)
Get full text
Journal Article
A2thOS: availability analysis and optimisation in SLAs
Zambon, Emmanuele, Etalle, Sandro, Wieringa, Roel J.
Published in International journal of network management (01.03.2012)
Published in International journal of network management (01.03.2012)
Get full text
Journal Article
Characterizing Building Automation System Attacks and Attackers
Tommasini, Martino, Rosso, Martin, Zambon, Emmanuele, Allodi, Luca, Hartog, Jerry den
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.06.2022)
Published in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.06.2022)
Get full text
Conference Proceeding
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network
Qin, Xi, Rosso, Martin, Cardenas, Alvaro A., Etalle, Sandro, den Hartog, Jerry, Zambon, Emmanuele
Published in 2022 IEEE Security and Privacy Workshops (SPW) (01.05.2022)
Published in 2022 IEEE Security and Privacy Workshops (SPW) (01.05.2022)
Get full text
Conference Proceeding
Extended eTVRA vs. security checklist: Experiences in a value-web
Morali, A., Zambon, E., Houmb, S.H., Sallhammar, K., Etalle, S.
Published in 2009 31st International Conference on Software Engineering - Companion Volume (01.05.2009)
Published in 2009 31st International Conference on Software Engineering - Companion Volume (01.05.2009)
Get full text
Conference Proceeding
POSEIDON: a 2-tier anomaly-based network intrusion detection system
Bolzoni, D., Etalle, S., Hartel, P.
Published in Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Published in Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Get full text
Conference Proceeding
Model-Based Mitigation of Availability Risks
Zambon, E., Bolzoni, D., Etalle, S., Salvato, M.
Published in 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management (01.05.2007)
Published in 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management (01.05.2007)
Get full text
Conference Proceeding
IT confidentiality risk assessment for an architecture-based approach
Morali, A., Zambon, E., Etalle, S., Overbeek, P.L.
Published in 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management (01.04.2008)
Published in 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management (01.04.2008)
Get full text
Conference Proceeding
documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mu $$\end{document}Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro
Published in Network and System Security
Published in Network and System Security
Get full text
Book Chapter