Damiano Bolzoni
TitleCited byYear
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006
1432006
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle
International Workshop on Recent Advances in Intrusion Detection, 354-373, 2012
822012
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11 (4), 231-251, 2012
642012
Panacea: Automating attack classification for anomaly-based network intrusion detection systems
D Bolzoni, S Etalle, PH Hartel
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009
502009
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
D Bolzoni, B Crispo, S Etalle
LISA 7, 1-12, 2007
352007
Challenges and opportunities in securing industrial control systems
D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel
2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012
332012
A model supporting business continuity auditing and planning in information systems
E Zambon, D Bolzoni, S Etalle, M Salvato
Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007
302007
Boosting web intrusion detection systems by inferring positive signatures
D Bolzoni, S Etalle
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
242008
Model-based mitigation of availability risks
E Zambon, D Bolzoni, S Etalle, M Salvato
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
222007
Approaches in anomaly-based network intrusion detection systems
D Bolzoni, S Etalle
Intrusion Detection Systems 38, 1-15, 2008
212008
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures
D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle
2011 Seventh European Conference on Computer Network Defense, 41-48, 2011
202011
Revisiting Anomaly-based Network Intrusion Detection Systems.
D Bolzoni
University of Twente, Enschede, Netherlands, 2009
192009
Method and system for alert classification in a computer network
D Bolzoni, S Etalle
US Patent 9,191,398, 2015
182015
Self configuring deep protocol network whitelisting
S Etalle, C Gregory, D Bolzoni, E Zambon
Security Matters, 2013
62013
Understanding and specifying information security needs to support the delivery of high quality security services
X Su, D Bolzoni, P Van Eck
The International Conference on Emerging Security Information, Systems, and …, 2007
62007
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection
E Zambon, D Bolzoni
Blackhat Conference, Las Vegas, NV. Retrieved from http://www. blackhat. com …, 2006
62006
Situational Awareness Network for the electric power system: The architecture and testing metrics
D Bolzoni, R Leszczyna, MR Wróbel
2016 Federated Conference on Computer Science and Information Systems …, 2016
52016
System and Method for Detecting Anomalies in Electronic Documents
D Bolzoni, E Zambon
US Patent App. 13/824,211, 2014
32014
Approaches in anomaly-based intrusion detection systems
D Bolzoni, S Etalle
1st Benelux Workshop on Information and System Security, 2006
32006
Specifying Information Security Needs for the Delivery of High Quality Security Services
X Su, D Bolzoni, P van Eck
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20