


default search action
CyberICPS/SECPRE@ESORICS 2018: Barcelona, Spain
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5
Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018)
- Hanan Hindy
, David Brosset
, Ethan Bayne
, Amar Seeam
, Xavier J. A. Bellekens
:
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning. 3-19 - Georgios Kavallieratos
, Sokratis K. Katsikas, Vasileios Gkioulos:
Cyber-Attacks Against the Autonomous Ship. 20-36 - Sridhar Adepu, Nandha Kumar Kandasamy, Aditya Mathur:
EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security. 37-52 - Sigrid Gürgens
, Daniel Zelle
:
A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles. 53-68 - Vasileios Gkioulos, Athanasios Rizos
, Christina Michailidou
, Paolo Mori
, Andrea Saracino:
Enhancing Usage Control for Performance: An Architecture for Systems of Systems. 69-84 - Ivo Berger
, Roland Rieke
, Maxim Kolomeets
, Andrey Chechulin
, Igor V. Kotenko
:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. 85-101 - Miguel Borges de Freitas
, Luís Rosa, Tiago Cruz
, Paulo Simões:
SDN-Enabled Virtual Data Diode. 102-118 - Peter Schneider
, Alexander Giehl
:
Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations. 119-134
Security and Privacy Requirements Engineering (SECPRE 2018)
- Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. 137-152 - Inger Anne Tøndel, Martin Gilje Jaatun, Daniela S. Cruzes, Tosin Daniel Oyetoyan:
Understanding Challenges to Adoption of the Protection Poker Software Security Game. 153-172 - Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li
, Guttorm Sindre:
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements. 173-191 - Fabio Martinelli, Oleksii Osliak, Andrea Saracino:
Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI. 192-212 - Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:
Run-Time Monitoring of Data-Handling Violations. 213-232

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.