default search action
Sandro Etalle
Person information
- affiliation: Eindhoven University of Technology, Netherlands
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j30]Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Demonstration of new attacks on three healthcare network protocols in a lab environment. J. Comput. Virol. Hacking Tech. 20(2): 301-314 (2024) - 2022
- [c110]Xi Qin, Martin Rosso, Alvaro A. Cárdenas, Sandro Etalle, Jerry den Hartog, Emmanuele Zambon:
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network. SP (Workshops) 2022: 243-250 - 2021
- [c109]Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Similarity-Based Clustering For IoT Device Classification. COINS 2021: 1-7 - 2020
- [c108]Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
A Matter of Life and Death: Analyzing the Security of Healthcare Networks. SEC 2020: 355-369 - [i18]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. CoRR abs/2007.02307 (2020)
2010 – 2019
- 2019
- [c107]Sandro Etalle:
Network Monitoring of Industrial Control Systems: The Lessons of SecurityMatters. CPS-SPC@CCS 2019: 1 - [c106]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. DIMVA 2019: 461-481 - [c105]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. EuroS&P 2019: 31-46 - [c104]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN. ICCVE 2019: 1-6 - [c103]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
A Survey of Network Intrusion Detection Systems for Controller Area Network. ICVES 2019: 1-6 - [i17]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
Network intrusion detection systems for in-vehicle network - Technical report. CoRR abs/1905.11587 (2019) - 2018
- [c102]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems. CRITIS 2018: 113-125 - [c101]Mahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone:
Behavior analysis in the medical sector: theory and practice. SAC 2018: 1637-1646 - [c100]Bram C. M. Cappers, Paulus N. Meessen, Sandro Etalle, Jarke J. van Wijk:
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics. VizSEC 2018: 1-8 - [i16]Luca Allodi, Sandro Etalle:
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions. CoRR abs/1801.04569 (2018) - 2017
- [j29]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
A white-box anomaly-based framework for database leakage detection. J. Inf. Secur. Appl. 32: 27-46 (2017) - [c99]Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. ACSAC 2017: 437-448 - [c98]Davide Fauri, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle, Stefano Tonetta:
From System Specification to Anomaly Detection (and back). CPS-SPC@CCS 2017: 13-24 - [c97]Sandro Etalle:
From Intrusion Detection to Software Design. ESORICS (1) 2017: 1-10 - [c96]Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. NSS 2017: 694-709 - [c95]Luca Allodi, Sandro Etalle:
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions. SafeConfig@CCS 2017: 23-26 - [c94]Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle:
Encryption in ICS networks: A blessing or a curse? SmartGridComm 2017: 289-294 - 2016
- [c93]Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle:
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. CRITIS 2016: 1-12 - [c92]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Towards Useful Anomaly Detection for Back Office Networks. ICISS 2016: 509-520 - [c91]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Reading between the fields: practical, effective intrusion detection for industrial control systems. SAC 2016: 2063-2070 - [c90]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [c89]Eelco Vriezekolk, Sandro Etalle, Roel J. Wieringa:
Validating the Raster Risk Assessment Method in Practice. ISCRAM 2015 - [c88]Eelco Vriezekolk, Sandro Etalle, Roel J. Wieringa:
Experimental Validation of a Risk Assessment Method. REFSQ 2015: 1-16 - 2014
- [j28]Sandro Etalle, Nicola Zannone:
Understanding Computer Security. Frontiers ICT 1: 3 (2014) - [j27]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14(3): 293-337 (2014) - [c87]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
Hunting the Unknown - White-Box Database Leakage Detection. DBSec 2014: 243-259 - [c86]Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
On Emulation-Based Network Intrusion Detection Systems. RAID 2014: 384-404 - 2013
- [j26]Daniel Trivellato, Nicola Zannone, Maurice Glaundrup, Jacek Skowronek, Sandro Etalle:
A Semantic Security Framework for Systems of Systems. Int. J. Cooperative Inf. Syst. 22(1) (2013) - [j25]Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. IEEE Trans. Inf. Forensics Secur. 8(8): 1294-1305 (2013) - [c85]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - [p3]Daniel Trivellato, Sandro Etalle, Erik Luit, Nicola Zannone:
The POLIPO Security Framework. Situation Awareness with Systems of Systems 2013: 189-208 - 2012
- [j24]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa:
A2thOS: availability analysis and optimisation in SLAs. Int. J. Netw. Manag. 22(2): 104-130 (2012) - [c84]Dina Hadziosmanovic, Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Challenges and opportunities in securing industrial control systems. COMPENG 2012: 1-6 - [c83]Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone:
Policy Administration in Tag-Based Authorization. FPS 2012: 162-179 - [c82]Eelco Vriezekolk, Roel J. Wieringa, Sandro Etalle:
Design and initial validation ofthe Rastermethod for telecom service availability risk assessment. ISCRAM 2012 - [c81]Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle:
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. RAID 2012: 354-373 - [c80]Mayla Brusò, Konstantinos Chatzikokolakis, Sandro Etalle, Jerry den Hartog:
Linking Unlinkability. TGC 2012: 129-144 - [e9]Gilles Barthe, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 [contents] - [i15]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: a Distributed Goal Evaluation Algorithm for Trust Management. CoRR abs/1210.0368 (2012) - 2011
- [j23]Lujo Bauer, Sandro Etalle, Jerry den Hartog, Luca Viganò:
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning". J. Autom. Reason. 46(3-4): 223-224 (2011) - [j22]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa, Pieter H. Hartel:
Model-based qualitative risk assessment for availability of IT infrastructures. Softw. Syst. Model. 10(4): 553-580 (2011) - [c79]Andrea Herrmann, Ayse Morali, Sandro Etalle, Roel J. Wieringa:
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. BIR Workshops 2011: 64-76 - [c78]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
Poster: protecting information in systems of systems. CCS 2011: 865-868 - [c77]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel, Sandro Etalle:
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. EC2ND 2011: 41-48 - [c76]Eelco Vriezekolk, Roel J. Wieringa, Sandro Etalle:
A new method to assess telecom service availability risks. ISCRAM 2011 - [c75]Damiano Bolzoni, Christiaan Schade, Sandro Etalle:
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. LISA 2011 - [c74]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
A Security Framework for Systems of Systems. POLICY 2011: 182-183 - [e8]Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 [contents] - 2010
- [j21]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [c73]Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa:
CRAC: Confidentiality risk assessment and IT-infrastructure comparison. CNSM 2010: 322-325 - [c72]Nicola Zannone, Milan Petkovic, Sandro Etalle:
Towards Data Protection Compliance. SECRYPT 2010: 213-216 - [c71]Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle:
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. IEEE Symposium on Security and Privacy 2010: 93-108 - [e7]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
Distributed Usage Control, 06.04. - 09.04.2010. Dagstuhl Seminar Proceedings 10141, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i14]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Abstracts Collection - Distributed Usage Control. Distributed Usage Control 2010 - [i13]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Summary - Distributed Usage Control. Distributed Usage Control 2010
2000 – 2009
- 2009
- [j20]Sandro Etalle, William H. Winsborough:
Maintaining control while delegating trust: Integrity constraints in trust management. ACM Trans. Inf. Syst. Secur. 13(1): 5:1-5:27 (2009) - [c70]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. CSE (3) 2009: 252-258 - [c69]Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Karin Sallhammar, Sandro Etalle:
Extended eTVRA vs. security checklist: Experiences in a value-web. ICSE Companion 2009: 130-140 - [c68]Marcin Czenko, Sandro Etalle:
LP with Flexible Grouping and Aggregates Using Modes. LOPSTR 2009: 67-81 - [c67]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. POLICY 2009: 110-113 - [c66]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. RAID 2009: 1-20 - 2008
- [c65]Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re:
IT confidentiality risk assessment for an architecture-based approach. BDIM 2008: 31-40 - [c64]Fred Spiessens, Jerry den Hartog, Sandro Etalle:
Know What You Trust. Formal Aspects in Security and Trust 2008: 129-142 - [c63]Marcin Czenko, Jeroen Doumen, Sandro Etalle:
Trust Management in P2P Systems Using Standard TuLiP. IFIPTM 2008: 1-16 - [c62]Damiano Bolzoni, Sandro Etalle:
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. OTM Conferences (2) 2008: 938-955 - [c61]M. A. C. Dekker, Jason Crampton, Sandro Etalle:
RBAC administration in distributed systems. SACMAT 2008: 93-102 - 2007
- [j19]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [j18]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed analysis of security protocols. J. Comput. Secur. 15(6): 619-645 (2007) - [c60]Sandro Etalle, Jerry den Hartog, Stephen Marsh:
Trust and punishment. Autonomics 2007: 5 - [c59]Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato:
Model-Based Mitigation of Availability Risks. BDIM 2007: 75-83 - [c58]M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - [c57]Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough:
An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281 - [c56]Marcin Czenko, Sandro Etalle:
Core TuLiP Logic Programming for Trust Management. ICLP 2007: 380-394 - [c55]Damiano Bolzoni, Bruno Crispo, Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152 - [c54]Sandro Etalle, William H. Winsborough:
A posteriori compliance control. SACMAT 2007: 11-20 - [c53]M. A. C. Dekker, Sandro Etalle:
Refinement for Administrative Policies. Secure Data Management 2007: 33-46 - [c52]Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin:
The Meaning of Logs. TrustBus 2007: 145-154 - [p2]Marnix Dekker, Sandro Etalle, Jerry den Hartog:
Privacy Policies. Security, Privacy, and Trust in Modern Data Management 2007: 383-397 - [e6]Sandro Etalle, Stephen Marsh:
Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada. IFIP 238, Springer 2007, ISBN 978-0-387-73654-9 [contents] - [e5]Sandro Etalle, Pierangela Samarati:
Proceedings of the Second International Workshop on Security and Trust Management, STM 2006, Hamburg, Germany, September 20-21, 2006. Electronic Notes in Theoretical Computer Science 179, Elsevier 2007 [contents] - 2006
- [j17]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [j16]Giorgio Delzanno, Sandro Etalle, Maurizio Gabbrielli:
Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory Pract. Log. Program. 6(3): 225-226 (2006) - [c51]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. IWIA 2006: 144-156 - [c50]Ricardo Corin, Sandro Etalle, Ari Saptawijaya:
A Logic for Constraint-based Security Protocol Analysis. S&P 2006: 155-168 - [c49]Sandro Etalle, Pierangela Samarati:
Preface. STM 2006: 1-2 - [c48]M. A. C. Dekker, Sandro Etalle:
Audit-Based Access Control for Electronic Health Records. VODCA@FOSAD 2006: 221-236 - [e4]Sandro Etalle, Miroslaw Truszczynski:
Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings. Lecture Notes in Computer Science 4079, Springer 2006, ISBN 3-540-36635-0 [contents] - [i12]Damiano Bolzoni, Sandro Etalle:
APHRODITE: an Anomaly-based Architecture for False Positive Reduction. CoRR abs/cs/0604026 (2006) - 2005
- [c47]Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso:
A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146 - [c46]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis:
Service Brokerage in Prolog. ICEIS (3) 2005: 409-412 - [c45]Ricardo Corin, Ari Saptawijaya, Sandro Etalle:
PS-LTL for Constraint-Based Security Protocol Analysis. ICLP 2005: 439-440 - [c44]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. POLICY 2005: 34-43 - [c43]Sandro Etalle, William H. Winsborough:
Integrity constraints in trust management. SACMAT 2005: 1-10 - [c42]Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612 - [c41]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - [e3]Sandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury:
Proceedings of the International Workshop on Software Verification and Validation, SVV@ICLP 2003, Mumbai, India, December 14, 2003. Electronic Notes in Theoretical Computer Science 118, Elsevier 2005 [contents] - [e2]Sandro Etalle:
Logic Based Program Synthesis and Transformation, 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3573, Springer 2005, ISBN 3-540-26655-0 [contents] - [i11]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. CoRR abs/cs/0502091 (2005) - [i10]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. CoRR abs/cs/0503036 (2005) - [i9]Sandro Etalle, William H. Winsborough:
Integrity Constraints in Trust Management. CoRR abs/cs/0503061 (2005) - [i8]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005) - [i7]Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. CoRR abs/cs/0511043 (2005) - 2004
- [j15]Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus:
Termination of simply moded logic programs with dynamic scheduling. ACM Trans. Comput. Log. 5(3): 470-507 (2004) - [c40]Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel J. Wieringa:
Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191 - [c39]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed model checking of security protocols. FMSE 2004: 23-32 - [c38]Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201 - [c37]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [c36]Ricardo Corin, Jeroen Doumen, Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks. WISP@ICATPN 2004: 47-63 - [p1]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi:
Declarative Semantics of Input Consuming Logic Programs. Program Development in Computational Logic 2004: 90-114 - [i6]Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel:
A Trace Logic for Local Security Properties. CoRR cs.CR/0411010 (2004) - 2003
- [c35]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law:
Approximating Fair Use in LicenseScript. ICADL 2003: 432-443 - [c34]Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga:
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- - [c33]