


default search action
CyberICPS/SECPRE@ESORICS 2018: Barcelona, Spain
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:

Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5
Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018)
- Hanan Hindy

, David Brosset
, Ethan Bayne
, Amar Seeam
, Xavier J. A. Bellekens
:
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning. 3-19 - Georgios Kavallieratos

, Sokratis K. Katsikas, Vasileios Gkioulos:
Cyber-Attacks Against the Autonomous Ship. 20-36 - Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:

EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. 37-52 - Sigrid Gürgens

, Daniel Zelle
:
A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles. 53-68 - Vasileios Gkioulos, Athanasios Rizos

, Christina Michailidou
, Paolo Mori
, Andrea Saracino:
Enhancing Usage Control for Performance: An Architecture for Systems of Systems. 69-84 - Ivo Berger

, Roland Rieke
, Maxim Kolomeets
, Andrey Chechulin
, Igor V. Kotenko
:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. 85-101 - Miguel Borges de Freitas

, Luís Rosa, Tiago Cruz
, Paulo Simões:
SDN-Enabled Virtual Data Diode. 102-118 - Peter Schneider

, Alexander Giehl
:
Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations. 119-134
Security and Privacy Requirements Engineering (SECPRE 2018)
- Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. 137-152 - Inger Anne Tøndel, Martin Gilje Jaatun, Daniela S. Cruzes, Tosin Daniel Oyetoyan:

Understanding Challenges to Adoption of the Protection Poker Software Security Game. 153-172 - Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li

, Guttorm Sindre:
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements. 173-191 - Fabio Martinelli, Oleksii Osliak, Andrea Saracino:

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI. 192-212 - Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:

Run-Time Monitoring of Data-Handling Violations. 213-232

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














