default search action
CyberICPS/SECPRE/ADIoT@ESORICS 2020: Guildford, UK
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4
CyberICPS Workshop
- Rhea C. Rinaldo, Dieter Hutter:
Integrated Analysis of Safety and Security Hazards in Automotive Systems. 3-18 - Georgios Kavallieratos, Sokratis K. Katsikas:
Attack Path Analysis for Cyber Physical Systems. 19-33 - Jason Jaskolka:
Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System. 34-51 - Nabin Chowdhury:
A Survey of Cryptography-Based Authentication for Smart Grid Communication. 52-66 - Tiago Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Anmoal Porwal:
Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment. 67-83 - Ahmed Amro:
IoT Vulnerability Scanning: A State of the Art. 84-99 - Richard James Thomas, Tom Chothia:
Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems. 100-116 - Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis:
Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts. 117-132
SECPRE Workshop
- Ángel Jesús Varela-Vaca, David Garcia Rosado, Luis Enrique Sánchez, María Teresa Gómez-López, Rafael M. Gasca, Eduardo Fernández-Medina:
Definition and Verification of Security Configurations of Cyber-Physical Systems. 135-155 - Dimitra Georgiou, Costas Lambrinoudakis:
GDPR Compliance: Proposed Guidelines for Cloud-Based Health Organizations. 156-169 - Vasiliki Diamantopoulou, Christos Kalloniatis, Christos Lyvas, Konstantinos N. Maliatsos, Matthieu Gay, Athanasios G. Kanatas, Costas Lambrinoudakis:
Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems. 170-184 - Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-Aries:
Identifying Implicit Vulnerabilities Through Personas as Goal Models. 185-202
ADIoT Workshop
- Dimitrios Kosmanos, Savvas Chatzisavvas, Antonios Argyriou, Leandros Maglaras:
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks. 205-223 - Thiemo Voigt, Carlos M. Pérez-Penichet, Christian Rohner:
Extended Abstract: Towards Physical-Layer Authentication for Backscatter Devices. 224-234 - Evgenia Novikova, Elena Doynikova, Igor V. Kotenko:
P2Onto: Making Privacy Policies Transparent. 235-252 - James Boorman, Benjamin Green, Daniel Prince:
Extended Abstract - Transformers: Intrusion Detection Data in Disguise. 253-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.