default search action
CyberICPS/SECPRE@ESORICS 2017: Oslo, Norway
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2
Protecting Industrial Control and Cyber-Physical Systems
- Vasily Mikhalev, Laurent Gomez, Frederik Armknecht, José Márquez:
Towards End-to-End Data Protection in Low-Power Networks. 3-18 - Vincent Raes, Jan Vossaert, Vincent Naessens:
Development of an Embedded Platform for Secure CPS Services. 19-34 - Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino:
Introducing Usage Control in MQTT. 35-43
Threats, Vulnerabilities and Risks
- Katja Tuma, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. 47-62 - Bastien Sultan, Fabien Dagnat, Caroline Fontaine:
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System. 63-76 - Bojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic, Sebastijan Stoja:
STRIDE to a Secure Smart Grid in a Hybrid Cloud. 77-90
Cyber Attacks in Industrial Control and Cyber-Physical Systems
- Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. 93-109 - Naman Govil, Anand Agrawal, Nils Ole Tippenhauer:
On Ladder Logic Bombs in Industrial Control Systems. 110-126 - Eyasu Getahun Chekole, John Henry Castellanos, Martín Ochoa, David K. Y. Yau:
Enforcing Memory Safety in Cyber-Physical Systems. 127-144
Detecting Attacks in Industrial Control and Cyber-Physical Systems
- Kirsi Helkala, Benjamin J. Knox, Øyvind Jøsok, Ricardo Gregorio Lugo, Stefan Sütterlin, Geir Olav Dyrkolbotn, Nils Kalstad Svendsen:
Supporting the Human in Cyber Defence. 147-162 - Ambika Shrestha Chitrakar, Slobodan Petrovic:
CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. 163-176 - Rizwan Qadeer, Carlos Murguia, Chuadhry Mujeeb Ahmed, Justin Ruths:
Multistage Downstream Attack Detection in a Cyber Physical System. 177-185
Security and Privacy Requirements Assurance and Evaluation
- Majed Alshammari, Andrew Simpson:
A UML Profile for Privacy-Aware Data Lifecycle Models. 189-209 - Vasiliki Diamantopoulou, Michalis Pavlidis, Haralambos Mouratidis:
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation. 210-225
Security Requirements Elicitation and Modelling
- Vivien M. Rooney, Simon N. Foley:
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation. 229-249 - Mohammad Torabi Dashti, Sasa Radomirovic:
An Anti-pattern for Misuse Cases. 250-261 - Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish:
Decision-Making in Security Requirements Engineering with Constrained Goal Models. 262-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.