1. 2017
  2. Formal analysis of XACML policies using SMT

    Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N. 1 May 2017 In : Computers and Security. 66, p. 185-203 19 p.

    Research output: Scientific - peer-reviewArticle

  3. APD tool: Mining anomalous patterns from event logs

    Genga, L., Alizadeh, M., Potena, D., Diamantini, C. & Zannone, N. 2017 In : Ceur Workshop Proceedings. 1920

    Research output: Scientific - peer-reviewArticle

  4. Subgraph mining for anomalous pattern discovery in event logs

    Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C. & Zannone, N. 2017 New Frontiers in Mining Complex Patterns - 5th International Workshop, NFMCP 2016 Held in Conjunction with ECML-PKDD 2016, Revised Selected Papers. Springer Verlag, Vol. 10312 LNCS, p. 181-197 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10312 LNCS)

    Research output: Scientific - peer-reviewConference contribution

  5. 2016
  6. Role mining with missing values

    Vavilis, S., Egner, A. I., Petković, M. & Zannone, N. 14 Dec 2016 Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016. Institute of Electrical and Electronics Engineers Inc., p. 167-176 10 p. 7784567

    Research output: Scientific - peer-reviewConference contribution

  7. A Hybrid Framework for Data Loss Prevention and Detection

    Costante, E., Fauri, D., Etalle, S., Hartog, J. D. & Zannone, N. 1 Aug 2016 Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 324-333 10 p. 7527785

    Research output: Scientific - peer-reviewConference contribution

  8. Flow-based reputation with uncertainty: evidence-based subjective logic

    Škorić, B., de Hoogh, S. J. A. & Zannone, N. 1 Aug 2016 In : International Journal of Information Security. 15, 4, p. 381-402 22 p.

    Research output: Scientific - peer-reviewArticle

  9. A severity-based quantification of data leakages in database systems

    Vavilis, S., Petković, M. & Zannone, N. 1 Jun 2016 In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

    Research output: Scientific - peer-reviewArticle

  10. A policy framework for data fusion and derived data control

    Den Hartog, J. & Zannone, N. 11 Mar 2016 ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. p. 47-57 11 p.

    Research output: Scientific - peer-reviewConference contribution

  11. An authorization service for collaborative situation awareness

    Egner, A. I., Luu, D., Den Hartog, J. & Zannone, N. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 136-138 3 p.

    Research output: Scientific - peer-reviewConference contribution

  12. Risk-based analysis of business process executions

    Alizadeh, M. & Zannone, N. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery (ACM), p. 130-132 3 p.

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 3 4 5 6 7 8 ...10 Next

ID: 108785