EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: MIDAS: Intrusion detection for SCADA
Home Policy Brochure Browse Search User Area Contact Help

2014

Barbosa, R.R.R. (2014) Anomaly Detection in SCADA Systems - A Network Based Approach. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 14-300 ISBN 978-90-365-3645-5
Constante, E. and den Hartog, J.I. and Petkovic, M. and Etalle, S. and Pechenizkiy, M. (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), July 14-16, 2014, Vienna, Austria. pp. 243-259. Lecture Notes in Computer Science 8566. Springer. ISBN 978-3-662-43936-4
Etalle, S. and Zannone, N. (2014) Understanding computer security. Frontiers in ICT, 1 (3). pp. 1-2. ISSN 2297-198X
Hadžiosmanović, D. (2014) The process matters: cyber security in industrial control systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-282 ISBN 978-90-365-3604-2
Trivellato, D. and Zannone, N. and Etalle, S. (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684 *** ISI Impact 0,952 ***

2013

Barbosa, R.R.R. and Sadre, R. and Pras, A. (2013) Flow whitelisting in SCADA networks. International Journal of Critical Infrastructure Protection , 6 (3–4). pp. 150-158. ISSN 1874-5482 *** ISI Impact 1,351 ***
Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 2,441 ***
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,526 ***

2012

Barbosa, R.R.R. and Sadre, R. and Pras, A. (2012) Difficulties in Modeling SCADA Traffic: A Comparative Analysis. In: 13th International Conference on Passive and Active Measurement, PAM 2012, 12-14 Mar 2012, Vienna, Austria. pp. 126-135. Lecture Notes in Computer Science 7192. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-28536-3
Barbosa, R.R.R. and Sadre, R. and Pras, A. (2012) A First Look into SCADA Network Traffic. In: Proceedings IEEE/IFIP Network Operations and Management Symposium (NOMS 2012), 16-20 Apr 2012, Maui, Hawaii, USA. 518-521. IEEE Computer Society. ISSN 1542-1201 ISBN 978-1-4673-0267-8
Barbosa, R.R.R. and Sadre, R. and Pras, A. (2012) Towards Periodicity Based Anomaly Detection in SCADA Networks. In: IEEE 17th Conference on Emerging Technologies & Factory Automation, ETFA 2012, 17-21 Sep 2012, Kraków, Poland. pp. 1-4. IEEE Industrial Electronics Society. ISSN 1946-0759 ISBN 978-1-4673-4737-2
Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 (4). pp. 231-251. ISSN 1615-5262 *** ISI Impact 1,279 ***
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,681 ***

2011

Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Kolesnichenko, A.V. and de Boer, P.T. and Remke, A.K.I. and Zambon, Emmanuele and Haverkort, B.R.H.M. (2011) Is Quantitative Analysis of Stuxnet Possible? In: QEST 2011: Fast Abstracts, 5-8 Sep 2011, Aachen, Germany. pp. 9-10. CTIT Workshop Proceedings WP11-03. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6

2010

Barbosa, R.R.R. and Pras, A. (2010) Intrusion Detection in SCADA Networks. In: 4th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2010), June 23-25, 2010, Zurich, Switzerland. pp. 163-166. Lecture Notes in Computer Science 6155. Springer. ISBN 978-3-642-13985-7
Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 2,113 ***
Costa, A. (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection. Master's thesis, University of Twente.
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) A Log Mining Approach for Process Monitoring in SCADA. Technical Report TR-CTIT-10-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 15-17 Sep 2010, Ottawa, Canada. pp. 500-501. Lecture Notes in Computer Science 6307. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15511-6
Pras, A. and Sperotto, A. and Moreira Moura, G.C. and Drago, I. and Barbosa, R.R.R. and Sadre, R. and de Oliveira Schmidt, R. and Hofstede, R.J. (2010) Attacks by “Anonymous” WikiLeaks Proponents not Anonymous. Technical Report TR-CTIT-10-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625