researchareas
This is an old revision of the document!
Research Areas
Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, physical security and malware engineering and trading, as well as management of health and sensible data and risk evaluation.
Below you can find an updated list of the recent and core contributions in these area of research.
Research output
Research Area | Staff member(s) | Sample of recent output | Full publication list |
---|---|---|---|
Network monitoring | Sandro Etalle, Jerry den Hartog |
| S. Etalle J. Hartog |
Software security | Wil Michiels |
| |
Secure data management | Jerry den Hartog, Milan Petkovic, Nicola Zannone | Formal analysis of XACML policies using SMT. Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone: Formal analysis of XACML policies using SMT. Computers & Security 66: 185-203 (2017) Data Governance and Transparency for Collaborative Systems. Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone: Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216 SAFAX - An Extensible Authorization Service for Cloud Environments. Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone: SAFAX - An Extensible Authorization Service for Cloud Environments. Front. ICT 2015 (2015) On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. Jason Crampton, Charles Morisset, Nicola Zannone: On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 GEM: A distributed goal evaluation algorithm for trust management. Daniel Trivellato, Nicola Zannone, Sandro Etalle: GEM: A distributed goal evaluation algorithm for trust management. TPLP 14(3): 293-337 (2014) | N. Zannone |
Deep learning applied to cyber security | Milan Petkovic |
| |
Process mining applied to security and privacy | Nicola Zannone | Subgraph Mining for Anomalous Pattern Discovery in Event Logs. Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach. Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 Privacy Analysis of User Behavior Using Alignments. Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) Controlling Break-the-Glass through Alignment Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 Purpose Control: Did You Process the Data for the Intended Purpose? Milan Petkovic, Davide Prandi, Nicola Zannone: Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168 | N. Zannone |
Attacker economics and operating environment | Luca Allodi | L. Allodi | |
Cyber-risk quantification | Luca Allodi | Security Events and Vulnerability Data for Cybersecurity Risk Estimation.Luca Allodi and Fabio Massacci (2017), Risk Analysis, 37: 1606–1627. doi:10.1111/risa.12864 Comparing vulnerability severity and exploits using case-control studies. Luca Allodi, Fabio Massacci.ACM Transactions on Information and System Security (TISSEC). 17, 1, Article 1 (August 2014), 20 pages. The heavy tails of vulnerability exploitation. Luca Allodi. In International Symposium on Engineering Secure Software and Systems (pp. 133-148). Springer, Cham. How CVSS is DOSsing your patching policy (and wasting your money). Luca Allodi, Fabio Massacci. Presentation at BlackHat USA 2013. Quantitative assessment of risk reduction with cybercrime black market monitoring. Luca Allodi, Woohyun Shim, Fabio Massacci. Proceedings of IEEE S&P 2013 International Workshop on Cyber Crime. | L. Allodi |
Identification and Authentication | Boris Skoric | ||
Information-theoretic security | Boris Skoric |
researchareas.1508772139.txt.gz · Last modified: 2021/01/10 20:59 (external edit)