Elisa Costante
Cited by
Cited by
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J Den Hartog
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Privacy-aware web service composition and ranking
E Costante, F Paci, N Zannone
2013 IEEE 20th International Conference on Web Services, 131-138, 2013
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE security and privacy workshops (SPW), 324-333, 2016
What websites know about you: Privacy policy analysis using information extraction
E Costante, J den Hartog, M Petković
International Workshop on Data Privacy Management, 146-159, 2012
From system specification to anomaly detection (and back)
D Fauri, DR dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
A white-box anomaly-based framework for database leakage detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
Journal of Information Security and Applications 32, 27-46, 2017
Encryption in ICS networks: A blessing or a curse?
D Fauri, B de Wijs, J den Hartog, E Costante, E Zambon, S Etalle
2017 IEEE International Conference on Smart Grid Communications …, 2017
Leveraging operational technology and the Internet of things to attack smart buildings
DR dos Santos, M Dagrada, E Costante
Journal of Computer Virology and Hacking Techniques 17 (1), 1-20, 2021
Hunting the Unknown - White-Box Database Leakage Detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
IFIP Annual Conference on Data and Applications Security and Privacy, 243-259, 2014
Leveraging semantics for actionable intrusion detection in building automation systems
D Fauri, M Kapsalakis, DR dos Santos, E Costante, J den Hartog, S Etalle
International conference on critical information infrastructures security …, 2018
Understanding perceived trust to reduce regret
E Costante, J Den Hartog, M Petković
Computational Intelligence 31 (2), 327-347, 2015
A three-layered model to implement data privacy policies
G Canfora, E Costante, I Pennino, CA Visaggio
Computer Standards & Interfaces 30 (6), 398-409, 2008
Database anomalous activities detection and quantification
E Costante, S Vavilis, S Etalle, J den Hartog, M Petković, N Zannone
2013 International Conference on Security and Cryptography (SECRYPT), 1-6, 2013
A matter of life and death: analyzing the security of healthcare networks
G Dupont, DR dos Santos, E Costante, J Den Hartog, S Etalle
ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020
Actionable cyber threat intelligence for automated incident response
C Leite, J den Hartog, D Ricardo dos Santos, E Costante
Nordic Conference on Secure IT Systems, 368-385, 2022
Role inference+ anomaly detection= situational awareness in BACnet networks
D Fauri, M Kapsalakis, DR dos Santos, E Costante, J den Hartog, S Etalle
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
Fingerprinting assisted by similarity-based semantic clustering
E Costante, DR Dos Santos, GFC Dupont
US Patent App. 17/362,770, 2022
Similarity-based clustering for IoT device classification
G Dupont, C Leite, DR dos Santos, E Costante, J den Hartog, S Etalle
2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS …, 2021
Trust management and user’s trust perception in e-business
E Costante, M Petkovic, J den Hartog
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, 64-83, 2013
The system can't perform the operation now. Try again later.
Articles 1–20