Elisa Costante
Title
Cited by
Cited by
Year
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J den Hartog
Proceedings of the 2012 ACM workshop on Privacy in the electronic society, 91-96, 2012
642012
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
512011
Privacy-aware web service composition and ranking
E Costante, F Paci, N Zannone
2013 IEEE 20th International Conference on Web Services, 131-138, 2013
502013
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE Security and Privacy Workshops (SPW), 324-333, 2016
312016
What websites know about you
E Costante, J den Hartog, M Petković
Data Privacy Management and Autonomous Spontaneous Security, 146-159, 2012
292012
A white-box anomaly-based framework for database leakage detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
Journal of Information Security and Applications 32, 27-46, 2017
262017
From system specification to anomaly detection (and back)
D Fauri, DR Dos Santos, E Costante, J den Hartog, S Etalle, S Tonetta
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
242017
Hunting the Unknown - White-Box Database Leakage Detection
E Costante, J den Hartog, M Petković, S Etalle, M Pechenizkiy
IFIP Annual Conference on Data and Applications Security and Privacy, 243-259, 2014
222014
A three-layered model to implement data privacy policies
G Canfora, E Costante, I Pennino, CA Visaggio
Computer Standards & Interfaces 30 (6), 398-409, 2008
192008
Understanding perceived trust to reduce regret
E Costante, J Den Hartog, M Petković
Computational Intelligence 31 (2), 327-347, 2015
172015
Database anomalous activities detection and quantification
E Costante, S Vavilis, S Etalle, J den Hartog, M Petković, N Zannone
2013 International Conference on Security and Cryptography (SECRYPT), 1-6, 2013
142013
Encryption in ICS networks: A blessing or a curse?
D Fauri, B de Wijs, J den Hartog, E Costante, E Zambon, S Etalle
2017 IEEE International Conference on Smart Grid Communications …, 2017
82017
Leveraging semantics for actionable intrusion detection in building automation systems
D Fauri, M Kapsalakis, DR dos Santos, E Costante, J den Hartog, S Etalle
International Conference on Critical Information Infrastructures Security …, 2018
72018
Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems
EE Miciolino, DD Noto, F Griscioli, M Pizzonia, J Kippe, S Pfrang, X Clotet, ...
International Journal of Critical Infrastructures 13 (2-3), 206-237, 2017
32017
Trust management and user’s trust perception in e-business
E Costante, M Petkovic, J den Hartog
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, 64-83, 2013
32013
Leveraging operational technology and the Internet of things to attack smart buildings
DR dos Santos, M Dagrada, E Costante
Journal of Computer Virology and Hacking Techniques, 1-20, 2020
12020
Role inference+ anomaly detection= situational awareness in bacnet networks
D Fauri, M Kapsalakis, DR dos Santos, E Costante, J den Hartog, S Etalle
International Conference on Detection of Intrusions and Malware, and …, 2019
12019
Privacy throughout the data cycle
E Costante
Technische Universiteit Eindhoven, 2015
12015
A Matter of Life and Death: Analyzing the Security of Healthcare Networks
G Dupont, DR dos Santos, E Costante, J den Hartog, S Etalle
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2020
2020
Role Inference+ Anomaly Detection= Situational Awareness in BACnet Networks
E Costante, J den Hartog, S Etalle
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20