Follow
Damiano Bolzoni
Title
Cited by
Cited by
Year
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1702006
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
1202012
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11, 231-251, 2012
1022012
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
D Bolzoni, S Etalle, PH Hartel
RAID 9, 1-20, 2009
612009
Challenges and opportunities in securing industrial control systems
D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel
2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012
392012
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
D Bolzoni, B Crispo, S Etalle
LISA 7, 1-12, 2007
382007
A model supporting business continuity auditing and planning in information systems
E Zambon, D Bolzoni, S Etalle, M Salvato
Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007
322007
Revisiting Anomaly-based Network Intrusion Detection Systems.
D Bolzoni
University of Twente, Enschede, Netherlands, 2009
312009
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures
D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle
2011 Seventh European Conference on Computer Network Defense, 41-48, 2011
302011
Boosting web intrusion detection systems by inferring positive signatures
D Bolzoni, S Etalle
On the Move to Meaningful Internet Systems: OTM 2008: OTM 2008 Confederated …, 2008
272008
Model-based mitigation of availability risks
E Zambon, D Bolzoni, S Etalle, M Salvato
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
252007
Approaches in anomaly-based network intrusion detection systems
D Bolzoni, S Etalle
Intrusion Detection Systems 38, 1-15, 2008
222008
Method and system for alert classification in a computer network
D Bolzoni, S Etalle
US Patent 9,191,398, 2015
162015
Indicators of malicious SSL connections
R Bortolameotti, A Peter, MH Everts, D Bolzoni
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
92015
Situational Awareness Network for the electric power system: The architecture and testing metrics
D Bolzoni, R Leszczyna, MR Wróbel
2016 Federated Conference on Computer Science and Information Systems …, 2016
82016
System and Method for Detecting Anomalies in Electronic Documents
D Bolzoni, E Zambon
US Patent App. 13/824,211, 2014
82014
Self-configuring deep protocol network whitelisting
S Etalle, C Gregory, D Bolzoni, E Zambon
Security Matters, 2013
72013
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection
E Zambon, D Bolzoni
Retrieved September 19, 2020, 2006
72006
Understanding and specifying information security needs to support the delivery of high quality security services
X Su, D Bolzoni, P Van Eck
The International Conference on Emerging Security Information, Systems, and …, 2007
62007
Approaches in anomaly-based intrusion detection systems
D Bolzoni, S Etalle
1st Benelux Workshop on Information and System Security, 2006
32006
The system can't perform the operation now. Try again later.
Articles 1–20