Welkom...

prof.dr. S. Etalle (Sandro)

Hoogleraar

Expertises

Semantics
Logic Programming
Access Control
Scheduling
System
Intrusion Detection
Anomaly
Document

Publicaties

Recente Artikelen
Abbasi, A., Holz, T., Zambon, E., & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers
Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems (Vol. 10394, pp. 694-709). Springer International. DOI: https://doi.org/10.1007/978-3-319-64701-2_55
Yüksel, Ö., den Hartog, J., & Etalle, S. (2016). Reading between the fields: practical, effective intrusion detection for industrial control systems. In SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2063-2070). New York: ACM. DOI: 10.1145/2851613.2851799
Mian, U. S., den Hartog, J., Etalle, S., & Zannone, N. (2015). Auditing with incomplete logs. In Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015 (pp. 1-23). Eindhoven: Technische Universiteit Eindhoven.
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Experimental Validation of a Risk Assessment Method. In 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 (pp. 1-16). (Lecture Notes in Computer Science; Vol. 9013). Cham, Switzerland: Springer. DOI: 10.1007/978-3-319-16101-3_1
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Validating the raster risk assessment method in practice. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), Proceedings of the ISCRAM 2015 Conference (pp. -). International Association for Information Systems for Crisis Response and Management (ISCRAM).
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 3-. [3]. DOI: 10.3389/fict.2014.00003
Trivellato, D., Zannone, N., & Etalle, S. (2014). GEM: A distributed goal evaluation algorithm for trust management. Theory and practice of logic programming, 14(3), 293-337. DOI: 10.1017/S1471068412000397
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 1-2. DOI: 10.3389/fict.2014.00003
Constante, E., den Hartog, J., Petkovic, M., Etalle, S., & Pechenizkiy, M. (2014). Hunting the Unknown. In 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec) (pp. 243-259). (Lecture Notes in Computer Science; Vol. 8566). Berlin: Springer. DOI: 10.1007/978-3-662-43936-4_16

Pure Link

Contactgegevens

Bezoekadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 4090
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  4090
Postbus 217
7500 AE Enschede