Seguir
Sandro Etalle
Sandro Etalle
TU Eindhoven and University of Twente
Dirección de correo verificada de tue.nl - Página principal
Título
Citado por
Citado por
Año
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003 …, 2003
2212003
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1802006
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
International Static Analysis Symposium, 326-341, 2002
1302002
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1262012
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
1252007
Transformations of CLP modules
S Etalle, M Gabrielli
Theoretical computer science 166 (1-2), 101-146, 1996
1151996
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
1112005
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
1022003
A posteriori compliance control
S Etalle, WH Winsborough
Proceedings of the 12th ACM symposium on Access control models and …, 2007
942007
On the unification free Prolog programs
KR Apt, S Etalle
International Symposium on Mathematical Foundations of Computer Science, 1-19, 1993
941993
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
872005
Audit-based access control for electronic health records
MAC Dekker, S Etalle
Electronic notes in theoretical computer science 168, 221-236, 2007
842007
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
802005
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003
792003
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
752003
Model-based qualitative risk assessment for availability of IT infrastructures
E Zambon, S Etalle, RJ Wieringa, P Hartel
Software & Systems Modeling 10, 553-580, 2011
742011
Challenges in designing exploit mitigations for deeply embedded systems
A Abbasi, J Wetzels, T Holz, S Etalle
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019
712019
Panacea: Automating attack classification for anomaly-based network intrusion detection systems
D Bolzoni, S Etalle, PH Hartel
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009
662009
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
632006
Timed model checking of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
632004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20