Poseidon: a 2-tier anomaly-based network intrusion detection system D Bolzoni, S Etalle, P Hartel Fourth IEEE International Workshop on Information Assurance (IWIA'06), 10 pp …, 2006 | 184 | 2006 |
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 128 | 2012 |
A log mining approach for process monitoring in SCADA D Hadžiosmanović, D Bolzoni, PH Hartel International Journal of Information Security 11, 231-251, 2012 | 104 | 2012 |
Panacea: Automating attack classification for anomaly-based network intrusion detection systems D Bolzoni, S Etalle, PH Hartel International Workshop on Recent Advances in Intrusion Detection, 1-20, 2009 | 67 | 2009 |
Challenges and opportunities in securing industrial control systems D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel 2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012 | 43 | 2012 |
ATLANTIDES: an architecture for alert verification in network intrusion detection systems D Bolzoni, B Crispo, S Etalle 21st Large Installation System Administration Conference (LISA'07), 141-152, 2007 | 40 | 2007 |
Revisiting anomaly-based network intrusion detection systems D Bolzoni | 36 | 2009 |
A model supporting business continuity auditing and planning in information systems E Zambon, D Bolzoni, S Etalle, M Salvato Second International Conference on Internet Monitoring and Protection (ICIMP …, 2007 | 33 | 2007 |
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle 2011 Seventh European Conference on Computer Network Defense, 41-48, 2011 | 29 | 2011 |
Boosting web intrusion detection systems by inferring positive signatures D Bolzoni, S Etalle OTM Confederated International Conferences" On the Move to Meaningful …, 2008 | 26 | 2008 |
Approaches in anomaly-based network intrusion detection systems D Bolzoni, S Etalle Intrusion Detection Systems 38, 1-15, 2008 | 26 | 2008 |
Model-based mitigation of availability risks E Zambon, D Bolzoni, S Etalle, M Salvato 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007 | 26 | 2007 |
Method and system for alert classification in a computer network D Bolzoni, S Etalle US Patent 9,191,398, 2015 | 16 | 2015 |
System and Method for Detecting Anomalies in Electronic Documents D Bolzoni, E Zambon US Patent App. 13/824,211, 2014 | 15 | 2014 |
Indicators of malicious SSL connections R Bortolameotti, A Peter, MH Everts, D Bolzoni Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 9 | 2015 |
Situational Awareness Network for the electric power system: The architecture and testing metrics D Bolzoni, R Leszczyna, MR Wróbel 2016 Federated Conference on Computer Science and Information Systems …, 2016 | 8 | 2016 |
Self-configuring deep protocol network whitelisting S Etalle, C Gregory, D Bolzoni, E Zambon Security Matters, 2013 | 8 | 2013 |
Network Intrusion Detection Systems. False Positive Reduction Through Anomaly Detection E Zambon, D Bolzoni Retrieved September 19, 2020, 2006 | 7 | 2006 |
Understanding and specifying information security needs to support the delivery of high quality security services X Su, D Bolzoni, P Van Eck The International Conference on Emerging Security Information, Systems, and …, 2007 | 6 | 2007 |
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks D Bolzoni, C Schade, S Etalle 25th Large Installation System Administration Conference (LISA 11), 2011 | 2 | 2011 |