Through the eye of the PLC: semantic security monitoring for industrial processes D Hadžiosmanović, R Sommer, E Zambon, PH Hartel Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 263 | 2014 |
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols D Hadžiosmanović, L Simionato, D Bolzoni, E Zambon, S Etalle Research in Attacks, Intrusions, and Defenses, 354-373, 2012 | 126 | 2012 |
A log mining approach for process monitoring in SCADA D Hadžiosmanović, D Bolzoni, PH Hartel International Journal of Information Security, 1-21, 2012 | 105 | 2012 |
Integrated safety and security risk assessment methods: a survey of key characteristics and applications S Chockalingam, D Hadžiosmanović, W Pieters, A Teixeira, P van Gelder Critical Information Infrastructures Security: 11th International Conference …, 2017 | 73 | 2017 |
Challenges and opportunities in securing industrial control systems D Hadziosmanovic, D Bolzoni, S Etalle, P Hartel 2012 Complexity in Engineering (COMPENG). Proceedings, 1-6, 2012 | 45 | 2012 |
On the feasibility of device fingerprinting in industrial control systems M Caselli, D Hadžiosmanović, E Zambon, F Kargl Critical Information Infrastructures Security: 8th International Workshop …, 2013 | 36 | 2013 |
MELISSA: Towards automated detection of undesirable user actions in critical infrastructures D Hadiosmanovic, D Bolzoni, P Hartel, S Etalle 2011 Seventh European Conference on Computer Network Defense, 41-48, 2011 | 30 | 2011 |
Through the eye of the PLC: towards semantic security monitoring for industrial control systems D Hadziosmanovic, R Sommer, E Zambon, P Hartel Proc. ACSAC 14, 22, 2014 | 26 | 2014 |
Security-by-experiment: Lessons from responsible deployment in cyberspace W Pieters, D Hadžiosmanović, F Dechesne Science and engineering ethics 22, 831-850, 2016 | 19 | 2016 |
Reconciling malicious and accidental risk in cyber security W Pieters, Z Lukszo, D Hadziosmanovic, J van den Berg Journal of internet services and information security 4 (2), 4-26, 2014 | 18 | 2014 |
TREsPASS: Plug-and-play attacker profiles for security risk analysis W Pieters, D Hadziosmanovic, A Lenin, L Montoya, J Willemson IEEE Security & Privacy poster abstracts, 2014 | 12 | 2014 |
Cyber security as social experiment W Pieters, D Hadžiosmanović, F Dechesne Proceedings of the 2014 new security paradigms workshop, 15-24, 2014 | 9 | 2014 |
The process matters: cyber security in industrial control systems D Hadziosmanovic Centre for Telematics and Information Technology (CTIT), Netherlands, 2014 | 9 | 2014 |
Experimenting with incentives: Security in pilots for future grids F Dechesne, D Hadziosmanovic, W Pieters IEEE Security & Privacy 12 (6), 59-66, 2014 | 8 | 2014 |
The Incident Prevention Team: A Proactive Approach to Information Security NM Pereira | 2 | 2015 |
MEDUSA: mining events to detect undesirable uSer actions in SCADA D Hadžiosmanović, D Bolzoni, P Hartel Recent Advances in Intrusion Detection, 500-501, 2010 | 1 | 2010 |
4.3 Testing, Evaluation, Data, Learning (Technical Security Metrics)–Working Group Report R Böhme, M Van Eeten, S Foley, D Hadžiosmanović, A Lenin, S Pape, ... Socio-Technical Security Metrics, 20, 2015 | | 2015 |
Smart Device Profiling for Smart SCADA D Hadziosmanovic, D Bolzoni, P Hartel Springer Verlag, 2011 | | 2011 |
Smart Network Access Control for Smart SCADA D Hadziosmanovic, D Bolzoni, P Hartel | | |
Poster: Improving SCADA Security with Context-aware Network Profiling D Hadziosmanovic, R Sommer, D Bolzoni, P Hartel | | |