LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga 2003 International Conference on Parallel Processing Workshops, 2003 …, 2003 | 222 | 2003 |
Poseidon: a 2-tier anomaly-based network intrusion detection system D Bolzoni, S Etalle, P Hartel Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006 | 180 | 2006 |
An improved constraint-based system for the verification of security protocols R Corin, S Etalle International Static Analysis Symposium, 326-341, 2002 | 128 | 2002 |
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 126 | 2012 |
Audit-based compliance control JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini International Journal of Information Security 6, 133-151, 2007 | 125 | 2007 |
Transformations of CLP modules S Etalle, M Gabrielli Theoretical computer science 166 (1-2), 101-146, 1996 | 114 | 1996 |
A logic for auditing accountability in decentralized systems R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005 | 112 | 2005 |
Assessing security in energy-efficient sensor networks YW Law, S Etalle, PH Hartel Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003 | 103 | 2003 |
On the unification free Prolog programs KR Apt, S Etalle International Symposium on Mathematical Foundations of Computer Science, 1-19, 1993 | 95 | 1993 |
A posteriori compliance control S Etalle, WH Winsborough Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 94 | 2007 |
Analysing password protocol security against off-line dictionary attacks R Corin, J Doumen, S Etalle Electronic Notes in Theoretical Computer Science 121, 47-63, 2005 | 87 | 2005 |
Audit-based access control for electronic health records MAC Dekker, S Etalle Electronic notes in theoretical computer science 168, 221-236, 2007 | 81 | 2007 |
An audit logic for accountability JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 80 | 2005 |
A formally verified decentralized key management architecture for wireless sensor networks YW Law, R Corin, S Etalle, PH Hartel Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003 | 77 | 2003 |
Model-based qualitative risk assessment for availability of IT infrastructures E Zambon, S Etalle, RJ Wieringa, P Hartel Software & Systems Modeling 10, 553-580, 2011 | 75 | 2011 |
LicenseScript: A novel digital rights language and its semantics CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003 | 73 | 2003 |
Challenges in designing exploit mitigations for deeply embedded systems A Abbasi, J Wetzels, T Holz, S Etalle 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019 | 67 | 2019 |
Panacea: Automating attack classification for anomaly-based network intrusion detection systems D Bolzoni, S Etalle, PH Hartel International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009 | 65 | 2009 |
A logic for constraint-based security protocol analysis R Corin, A Saptawijaya 2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006 | 63 | 2006 |
Timed model checking of security protocols R Corin, S Etalle, PH Hartel, A Mader Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004 | 63 | 2004 |