User Tools

Site Tools


researchareas

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
researchareas [2017/11/16 15:33] setalleresearchareas [2020/11/19 17:40] lallodi
Line 10: Line 10:
 ^ Research Area ^ Staff member(s) ^ Sample of output ^ ^ Research Area ^ Staff member(s) ^ Sample of output ^
 | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] | <WRAP> | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] | <WRAP>
-* [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | slides ]] +  * [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | (slides]] 
-</WRAP> +  * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017) 
-|  +  * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017. 
 +</WRAP> |  
 | Software security | Wil Michiels | | | Software security | Wil Michiels | |
 | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | <WRAP> | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | <WRAP>
Line 29: Line 30:
   *  [[https://doi.org/10.1007/978-3-642-23556-6_10|Purpose Control: Did You Process the Data for the Intended Purpose?]] Milan Petkovic, Davide Prandi, Nicola Zannone: Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168   *  [[https://doi.org/10.1007/978-3-642-23556-6_10|Purpose Control: Did You Process the Data for the Intended Purpose?]] Milan Petkovic, Davide Prandi, Nicola Zannone: Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168
 </WRAP> </WRAP>
-| [[attackereconomics|Attacker economics and operating environment]] | [[http://www.win.tue.nl/~lallodi/|L. Allodi]] | <WRAP>+| [[attackereconomics|Attacker economics and operating environment]] | [[https://lallodi.github.io|L. Allodi]] | <WRAP>
   * [[https://arxiv.org/abs/1708.04866| Economic Factors of Vulnerability Trade and Exploitation: empirical evidence from a prominent Russian cybercrime market.]] Luca Allodi. ACM Conference on Computer and Communications Security (CCS) 2017.   * [[https://arxiv.org/abs/1708.04866| Economic Factors of Vulnerability Trade and Exploitation: empirical evidence from a prominent Russian cybercrime market.]] Luca Allodi. ACM Conference on Computer and Communications Security (CCS) 2017.
   * [[http://www.win.tue.nl/~lallodi/allodi-tetcs-15.pdf| Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned.]] Luca Allodi, Marco Corradin, Fabio Massacci. IEEE Transactions on Emerging Topics in Computing, 4(1):35–46, Jan 2016.   * [[http://www.win.tue.nl/~lallodi/allodi-tetcs-15.pdf| Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned.]] Luca Allodi, Marco Corradin, Fabio Massacci. IEEE Transactions on Emerging Topics in Computing, 4(1):35–46, Jan 2016.
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen