Poseidon: a 2-tier anomaly-based network intrusion detection system D Bolzoni, S Etalle, P Hartel Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006 | 170 | 2006 |
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 120 | 2012 |
A log mining approach for process monitoring in SCADA D Hadžiosmanović, D Bolzoni, PH Hartel International Journal of Information Security 11, 231-251, 2012 | 102 | 2012 |
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. D Bolzoni, S Etalle, PH Hartel RAID 9, 1-20, 2009 | 61 | 2009 |
Challenges and opportunities in securing industrial control systems D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel 2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012 | 39 | 2012 |
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. D Bolzoni, B Crispo, S Etalle LISA 7, 1-12, 2007 | 38 | 2007 |
A model supporting business continuity auditing and planning in information systems E Zambon, D Bolzoni, S Etalle, M Salvato Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007 | 32 | 2007 |
Revisiting Anomaly-based Network Intrusion Detection Systems. D Bolzoni University of Twente, Enschede, Netherlands, 2009 | 31 | 2009 |
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle 2011 Seventh European Conference on Computer Network Defense, 41-48, 2011 | 30 | 2011 |
Boosting web intrusion detection systems by inferring positive signatures D Bolzoni, S Etalle On the Move to Meaningful Internet Systems: OTM 2008: OTM 2008 Confederated …, 2008 | 27 | 2008 |
Model-based mitigation of availability risks E Zambon, D Bolzoni, S Etalle, M Salvato 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007 | 25 | 2007 |
Approaches in anomaly-based network intrusion detection systems D Bolzoni, S Etalle Intrusion Detection Systems 38, 1-15, 2008 | 22 | 2008 |
Method and system for alert classification in a computer network D Bolzoni, S Etalle US Patent 9,191,398, 2015 | 16 | 2015 |
Indicators of malicious SSL connections R Bortolameotti, A Peter, MH Everts, D Bolzoni Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 9 | 2015 |
Situational Awareness Network for the electric power system: The architecture and testing metrics D Bolzoni, R Leszczyna, MR Wróbel 2016 Federated Conference on Computer Science and Information Systems …, 2016 | 8 | 2016 |
System and Method for Detecting Anomalies in Electronic Documents D Bolzoni, E Zambon US Patent App. 13/824,211, 2014 | 8 | 2014 |
Self-configuring deep protocol network whitelisting S Etalle, C Gregory, D Bolzoni, E Zambon Security Matters, 2013 | 7 | 2013 |
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection E Zambon, D Bolzoni Retrieved September 19, 2020, 2006 | 7 | 2006 |
Understanding and specifying information security needs to support the delivery of high quality security services X Su, D Bolzoni, P Van Eck The International Conference on Emerging Security Information, Systems, and …, 2007 | 6 | 2007 |
Approaches in anomaly-based intrusion detection systems D Bolzoni, S Etalle 1st Benelux Workshop on Information and System Security, 2006 | 3 | 2006 |