default search action
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: Luxembourg
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5
CyberICPS Workshop
- Jonguk Kim, Jeong-Han Yun, HyoungChun Kim:
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. 3-18 - Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro:
Reflective Attenuation of Cyber-Physical Attacks. 19-34 - Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli:
Distributed UCON in CoAP and MQTT Protocols. 35-52 - Nikolaos Pitropakis, Marios Logothetis, Gennady L. Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis:
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. 53-68 - Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation. 69-85 - Damjan Gogic, Bojan Jelacic, Imre Lendák:
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs. 86-97 - Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. 98-107
SECPRE Workshop
- Jan Willemson:
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. 111-121 - Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis:
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics. 122-139 - Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis:
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems. 140-158 - Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns. 159-180 - Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis:
GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers. 181-194 - Dimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. 195-203 - Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. 204-223 - Mohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. 224-237 - Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. 238-257
SPOSE Workshop
- Yang Liu, Andrew Simpson:
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. 261-278 - Jan Zibuschka:
Analysis of Automation Potentials in Privacy Impact Assessment Processes. 279-286 - Sebastian Pape, Jelena Stankovic:
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. 287-306 - Hugh D. Lester, Martin J. Miller:
Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture Change. 307-322
ADIoT Workshop
- Deepak Kumar Dalai:
A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme. 325-340 - Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. 341-359 - Ali Hariri, Nicolas Giannelos, Budi Arief:
Selective Forwarding Attack on IoT Home Security Kits. 360-373 - Philokypros P. Ioulianou, Vassilios G. Vassilakis:
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things. 374-390 - Dennis Tatang, Tim Suurland, Thorsten Holz:
Study of DNS Rebinding Attacks on Smart Home Devices. 391-401 - Evgenia Novikova, Mikhail Bestuzhev, Igor V. Kotenko:
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. 402-418 - Matthias Schäfer, Carolina Nogueira, Jens B. Schmitt, Vincent Lenders:
Secure Location Verification: Why You Want Your Verifiers to Be Mobile. 419-437
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.