default search action
CyberICPS/SECPRE@ESORICS 2018: Barcelona, Spain
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5
Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018)
- Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier J. A. Bellekens:
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning. 3-19 - Georgios Kavallieratos, Sokratis K. Katsikas, Vasileios Gkioulos:
Cyber-Attacks Against the Autonomous Ship. 20-36 - Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. 37-52 - Sigrid Gürgens, Daniel Zelle:
A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles. 53-68 - Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino:
Enhancing Usage Control for Performance: An Architecture for Systems of Systems. 69-84 - Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. 85-101 - Miguel Borges de Freitas, Luís Rosa, Tiago Cruz, Paulo Simões:
SDN-Enabled Virtual Data Diode. 102-118 - Peter Schneider, Alexander Giehl:
Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations. 119-134
Security and Privacy Requirements Engineering (SECPRE 2018)
- Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. 137-152 - Inger Anne Tøndel, Martin Gilje Jaatun, Daniela S. Cruzes, Tosin Daniel Oyetoyan:
Understanding Challenges to Adoption of the Protection Poker Software Security Game. 153-172 - Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements. 173-191 - Fabio Martinelli, Oleksii Osliak, Andrea Saracino:
Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI. 192-212 - Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:
Run-Time Monitoring of Data-Handling Violations. 213-232
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.