prof.dr. S. Etalle (Sandro)


Logic Programming
Access Control
Intrusion Detection


Abbasi, A., Holz, T., Zambon, E., & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 (pp. 437-448). Association for Computing Machinery. DOI: 10.1145/3134600.3134618
Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings (pp. 694-709). ( Lecture Notes in Computer Science; Vol. 10394). Springer International. DOI: 10.1007/978-3-319-64701-2_55
Yüksel, Ö., den Hartog, J., & Etalle, S. (2016). Reading between the fields: practical, effective intrusion detection for industrial control systems. In SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2063-2070). New York: Association for Computing Machinery. DOI: 10.1145/2851613.2851799
Mian, U. S., den Hartog, J., Etalle, S., & Zannone, N. (2015). Auditing with incomplete logs. In Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015 (pp. 1-23). Eindhoven: Technische Universiteit Eindhoven.
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Experimental Validation of a Risk Assessment Method. In 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 (pp. 1-16). (Lecture Notes in Computer Science; Vol. 9013). Cham, Switzerland: Springer. DOI: 10.1007/978-3-319-16101-3_1
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Validating the raster risk assessment method in practice. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), Proceedings of the ISCRAM 2015 Conference (pp. -). International Association for Information Systems for Crisis Response and Management (ISCRAM).
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 3-. [3]. DOI: 10.3389/fict.2014.00003
Trivellato, D., Zannone, N., & Etalle, S. (2014). GEM: A distributed goal evaluation algorithm for trust management. Theory and practice of logic programming, 14(3), 293-337. DOI: 10.1017/S1471068412000397
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 1-2. DOI: 10.3389/fict.2014.00003
Constante, E., den Hartog, J., Petkovic, M., Etalle, S., & Pechenizkiy, M. (2014). Hunting the Unknown. In 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec) (pp. 243-259). (Lecture Notes in Computer Science; Vol. 8566). Berlin: Springer. DOI: 10.1007/978-3-662-43936-4_16

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands