Skip to main content

and
  1. Article

    Open Access

    Demonstration of new attacks on three healthcare network protocols in a lab environment

    Healthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected medical devices which can deliver health care, support hosp...

    Guillaume Dupont, Daniel dos Santos in Journal of Computer Virology and Hacking T… (2024)

  2. No Access

    Chapter and Conference Paper

    Actionable Cyber Threat Intelligence for Automated Incident Response

    Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In this paper, we propose an automated approach for using Cyber...

    Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos in Secure IT Systems (2022)

  3. No Access

    Article

    Leveraging operational technology and the Internet of things to attack smart buildings

    In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsyst...

    Daniel Ricardo dos Santos, Mario Dagrada in Journal of Computer Virology and Hacking T… (2021)

  4. No Access

    Chapter and Conference Paper

    A Matter of Life and Death: Analyzing the Security of Healthcare Networks

    Healthcare Delivery Organizations (HDOs) are complex institutions where a broad range of devices are interconnected. This inter-connectivity brings security concerns and we are observing an increase in the num...

    Guillaume Dupont, Daniel Ricardo dos Santos in ICT Systems Security and Privacy Protection (2020)

  5. No Access

    Chapter and Conference Paper

    Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems

    In smart buildings, physical components (e.g., controllers, sensors, and actuators) are interconnected and communicate with each other using network protocols such as BACnet. Many smart building networks are n...

    Davide Fauri, Michail Kapsalakis in Critical Information Infrastructures Secur… (2019)

  6. No Access

    Chapter and Conference Paper

    Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks

    In smart buildings, cyber-physical components (e.g., controllers, sensors, and actuators) communicate with each other using network protocols such as BACnet. Many of these devices are now connected to the Inte...

    Davide Fauri, Michail Kapsalakis in Detection of Intrusions and Malware, and V… (2019)

  7. Chapter and Conference Paper

    Hunting the Unknown

    Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...

    Elisa Costante, Jerry den Hartog in Data and Applications Security and Privacy… (2014)

  8. No Access

    Chapter and Conference Paper

    What Websites Know About You

    The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...

    Elisa Costante, Jerry den Hartog in Data Privacy Management and Autonomous Spo… (2013)