EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: PROSECCO: next generation PROtection and SECurity of COntent
Home Policy Brochure Browse Search User Area Contact Help

2014

Barbosa, R.R.R. (2014) Anomaly Detection in SCADA Systems - A Network Based Approach. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 14-300 ISBN 978-90-365-3645-5

2011

Sperotto, A. and Pras, A. (2011) Flow-Based Intrusion Detection. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2011 , 23-27 May 2011, Dublin, Ireland. pp. 958-963. IEEE Communications Society. ISBN 978-1-4244-9219-0
Zambon, Emmanuele (2011) Towards Optimal IT Availability Planning: Methods and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-188 ISBN 978-90-365-3102-3
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 0,990 ***

2010

Sperotto, A. (2010) Flow-based intrusion detection. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-180 ISBN 978-90-365-3089-7
Sperotto, A. and Schaffrath, G. and Sadre, R. and Morariu, C. and Pras, A. and Stiller, B. (2010) An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys & Tutorials, 12 (3). pp. 343-356. ISSN 1553-877X *** ISI Impact 9,220 ***
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2009

Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Model-Based Illumination Correction for Face Images in Uncontrolled Scenarios. In: Computer Analysis of Images and Patterns 2009, 2-4 Sep 2009, Munster. pp. 33-40. Lecture Notes in Computer Science 5702/2009. Springer Verlag. ISBN 978-3-642-03766-5
Boom, B.J. and Tao, Qian and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Combining Illumination Normalization Methods for Better Face Recognition. In: The 3rd IAPR/IEEE International Conference on Biometrics, 2 Jun - 5 Jun 2009, Alghero, Italy. pp. 404-413. Lecture Notes in Computer Science Advances in Biometrics (Volume 5558/2009). Springer Verlag. ISBN 978-3-642-01792-6
Sperotto, A. and Sadre, R. and de Boer, P.T. and Pras, A. (2009) Hidden Markov Model modeling of SSH brute-force attacks. In: Integrated Management of Systems, Services, Processes and People in IT, Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, October 27-28, 2009, Venice, Italy. pp. 164-176. Lecture Notes in Computer Science 5841/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04988-0
Sperotto, A. and Sadre, R. and van Vliet, D.F. and Pras, A. (2009) A Labeled Data Set For Flow-based Intrusion Detection. In: IP Operations and Management, Proceedings of the 9th IEEE Intenational Workshop IPOM 2009, October 29-30, 2009, Venice, Italy. pp. 39-50. Lecture Notes in Computer Science 5843/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04967-5
Sperotto, A. and Vliek, G. and Sadre, R. and Pras, A. (2009) Detecting Spam at the Network Level. In: Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, 7-9 Sep 2009, Barcelona. pp. 208-216. Lecture Notes in Computer Science 5733. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-03699-6
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2008) Model-based reconstruction for illumination variation in face images. In: 8th IEEE International Conference on Automatic Face and Gesture Recognition, 17 Sept - 19 Sept 2008, Amsterdam, The Netherlands. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2154-1

2007

Sperotto, A. and van de Meent, R. (2007) A Survey of the High-Speed Self-Learning Intrusion Detection Research Area. In: First International Conference on Autonomous Infrastructure, Management and Security, 21-22 Jun 2007, Oslo, Norway. pp. 196-199. Lecture Notes in Computer Science 4543. Springer Verlag. ISBN 978-3-540-72985-3
Sperotto, A. and Pelillo, M. (2007) Szemeredi's Regularity Lemma and Its Applications to Pairwise Clustering and Segmentation. In: Energy Minimization Methods in Computer Vision and Pattern Recognition Energy Minimization Methods in Computer Vision and Pattern Recognition, 6th International Conference, EMMCVPR 2007, 27-29 Aug 2007, EZhou, Hubei, China. pp. 13-27. Lecture Notes in Computer Science 4679. Springer Verlag. ISBN 978-3-540-74195-4
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), October 14-20, 2007, Valencia, Spain. pp. 107-114. IEEE Computer Society. ISBN 0-7695-2989-5
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany. pp. 112-113. IEEE Computer Society. ISBN 1-4244-1295-1
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1

2006

Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Technical Report TR-CTIT-06-73, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Gulla, J.A. (2006) An information retrieval approach to ontology mapping. Data and knowledge engineering, 58 (1). pp. 47-69. ISSN 0169-023X *** ISI Impact 1,500 ***

2005

Ingvaldsen, J.E. and Gulla, J.A. and Su, X. and Rønneberg, H. (2005) A Text Mining Approach to Integrating Business Process Models and Governing Documents. In: On the Move to Meaningful Internet Systems (OTM) Workshop, 31 Oct-4 Nov 2004, Agia Napa, Cyprus. pp. 473-484. Lecture Notes in Computer Science 3762. Springer. ISBN 978-3-540-29739-0