prof.dr. S. Etalle (Sandro)


Compliance Control
Risk Assessment
Access Control
Sensor Networks
Side Channel Attack
Computer Systems
System Of Systems
Intrusion Detection
Data Storage Equipment
Flow Control
Programmable Logic Controllers
Self Organizing Maps
Embedded Systems


Abbasi, A., Holz, T., Zambon, E., & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 (pp. 437-448). Association for Computing Machinery. DOI: 10.1145/3134600.3134618
Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings (pp. 694-709). ( Lecture Notes in Computer Science; Vol. 10394). Springer International. DOI: 10.1007/978-3-319-64701-2_55
Yüksel, Ö., den Hartog, J., & Etalle, S. (2016). Reading between the fields: practical, effective intrusion detection for industrial control systems. In SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2063-2070). New York: Association for Computing Machinery. DOI: 10.1145/2851613.2851799
Mian, U. S., den Hartog, J., Etalle, S., & Zannone, N. (2015). Auditing with incomplete logs. In Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015 (pp. 1-23). Eindhoven: Technische Universiteit Eindhoven.
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Experimental Validation of a Risk Assessment Method. In 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 (pp. 1-16). (Lecture Notes in Computer Science; Vol. 9013). Cham, Switzerland: Springer. DOI: 10.1007/978-3-319-16101-3_1
Vriezekolk, E., Etalle, S., & Wieringa, R. J. (2015). Validating the raster risk assessment method in practice. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), Proceedings of the ISCRAM 2015 Conference (pp. -). International Association for Information Systems for Crisis Response and Management (ISCRAM).
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 3-. [3]. DOI: 10.3389/fict.2014.00003
Trivellato, D., Zannone, N., & Etalle, S. (2014). GEM: A distributed goal evaluation algorithm for trust management. Theory and practice of logic programming, 14(3), 293-337. DOI: 10.1017/S1471068412000397
Etalle, S., & Zannone, N. (2014). Understanding computer security. Frontiers in ICT, 1(3), 1-2. DOI: 10.3389/fict.2014.00003
Constante, E., den Hartog, J., Petkovic, M., Etalle, S., & Pechenizkiy, M. (2014). Hunting the Unknown. In 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec) (pp. 243-259). (Lecture Notes in Computer Science; Vol. 8566). Berlin: Springer. DOI: 10.1007/978-3-662-43936-4_16

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands