Elisa Costante
Cited by
Cited by
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J Den Hartog
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Privacy-aware web service composition and ranking
E Costante, F Paci, N Zannone
2013 IEEE 20th International Conference on Web Services, 131-138, 2013
What websites know about you
E Costante, J Hartog, M Petković
Data Privacy Management and Autonomous Spontaneous Security, 146-159, 2012
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE security and privacy workshops (SPW), 324-333, 2016
A white-box anomaly-based framework for database leakage detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
Journal of Information Security and Applications 32, 27-46, 2017
From system specification to anomaly detection (and back)
D Fauri, DR Dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
Hunting the Unknown - White-Box Database Leakage Detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
IFIP Annual Conference on Data and Applications Security and Privacy, 243-259, 2014
A three-layered model to implement data privacy policies
G Canfora, E Costante, I Pennino, CA Visaggio
Computer Standards & Interfaces 30 (6), 398-409, 2008
Understanding perceived trust to reduce regret
E Costante, J Den Hartog, M Petković
Computational Intelligence 31 (2), 327-347, 2015
Database anomalous activities detection and quantification
E Costante, S Vavilis, S Etalle, J den Hartog, M Petković, N Zannone
2013 International Conference on Security and Cryptography (SECRYPT), 1-6, 2013
Encryption in ICS networks: A blessing or a curse?
D Fauri, B de Wijs, J den Hartog, E Costante, E Zambon, S Etalle
2017 IEEE International Conference on Smart Grid Communications …, 2017
Leveraging semantics for actionable intrusion detection in building automation systems
D Fauri, M Kapsalakis, DR dos Santos, E Costante, J den Hartog, S Etalle
International Conference on Critical Information Infrastructures Security …, 2018
Leveraging operational technology and the Internet of things to attack smart buildings
DR dos Santos, M Dagrada, E Costante
Journal of Computer Virology and Hacking Techniques 17 (1), 1-20, 2021
A matter of life and death: analyzing the security of healthcare networks
G Dupont, DR Santos, E Costante, J Hartog, S Etalle
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2020
Role inference+ anomaly detection= situational awareness in BACnet networks
D Fauri, M Kapsalakis, DR Santos, E Costante, J Hartog, S Etalle
International Conference on Detection of Intrusions and Malware, and …, 2019
Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems
EE Miciolino, DD Noto, F Griscioli, M Pizzonia, J Kippe, S Pfrang, X Clotet, ...
International Journal of Critical Infrastructures 13 (2-3), 206-237, 2017
Trust management and user’s trust perception in e-business
E Costante, M Petkovic, J den Hartog
Handbook of Research on E-Business Standards and Protocols: Documents, Data …, 2012
Privacy throughout the data cycle
E Costante
Technische Universiteit Eindhoven, 2015
Similarity-Based Clustering For IoT Device Classification
G Dupont, C Leite, DR dos Santos, E Costante, J den Hartog, S Etalle
2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20