default search action
CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: Copenhagen, Denmark
- Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8
8th Workshop on Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2022)
- Aida Akbarzadeh, Sokratis K. Katsikas:
Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies. 5-25 - Muhammad Ramadan Saifuddin, Lin Wei, Heng Chuan Tan, Binbin Chen:
Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study. 26-45 - Yuqing Zhu, Sridhar Adepu, Kushagra Dixit, Ying Yang, Xin Lou:
Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles. 46-66 - Adriaan de Vos, Alessandro Brighente, Mauro Conti:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. 67-80 - Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP. 81-96 - Sunil Chaudhary, Vasileios Gkioulos, David Goodman:
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources. 97-115 - Nabin Chowdhury, Vasileios Gkioulos:
A Framework for Developing Tabletop Cybersecurity Exercises. 116-133 - Christos Lyvas, Konstantinos N. Maliatsos, Andreas Menegatos, Thrasyvoulos Giannakopoulos, Costas Lambrinoudakis, Christos Kalloniatis, Athanasios G. Kanatas:
A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems. 134-152
6th International Workshop on Security and Privacy Requirements Engineering (SECPRE 2022)
- Mohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. 157-176 - Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Measuring the Adoption of TLS Encrypted Client Hello Extension and Its Forebear in the Wild. 177-190
4th Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE 2022)
- Frank Ebbers, Murat Karaboga:
Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study. 195-211 - Abdelhadi Belfadel, Martin Boyer, Jérôme Letailleur, Yohann Petiot, Reda Yaich:
Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack Approach. 212-227 - Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems. 228-247 - M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, Annalina Buckmann:
Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours. 248-265
3rd Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2022)
- Mariano Ceccato, Youssef Driouich, Ruggero Lanotte, Marco Lucchese, Massimo Merro:
Towards Reverse Engineering of Industrial Physical Processes. 273-290 - Ilias Gkotsis, Leonidas Perlepes, Aggelos Aggelis, Katerina Valouma, Antonis Kostaridis, Eftichia Georgiou, Nikolaos Lalazisis, Vasiliki Mantzana:
Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response. 291-307 - Kushal Srivastava, Corinna Köpke, Johannes Walter, Katja Faist, John Marschalk Berry, Claudio Porretti, Alexander Stolz:
Modelling and Simulation of Railway Networks for Resilience Analysis. 308-320 - George Kokolakis, Grigoris Ntousakis, Irodotos Karatsoris, Spiros Antonatos, Manos Athanatos, Sotiris Ioannidis:
HoneyChart: Automated Honeypot Management over Kubernetes. 321-328 - Filipe Apolinário, João Guiomar, Éric Hervé, Sven Hrastnik, Nelson Escravana, Miguel L. Pardal, Miguel Correia:
ComSEC: Secure Communications for Baggage Handling Systems. 329-345 - Corinna Köpke, Johannes Walter, Eros Cazzato, Catalin Linguraru, Uli Siebold, Alexander Stolz:
Methodology for Resilience Assessment for Rail Infrastructure Considering Cyber-Physical Threats. 346-361 - Maximilian Beckmann, Jan Steffan:
Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing. 362-378 - Asya Mitseva, Paul Thierse, Harald Hoffmann, Devran Er, Andriy Panchenko:
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research. 379-397 - Daniel De Pascale, Mirella Sangiovanni, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan van den Heuvel:
Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture. 398-408 - Francesco Spegni, Antonio Sabatelli, Alessio Merlo, Lucia Pepa, Luca Spalazzi, Luca Verderame:
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case. 409-426
2nd International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge (CDT & SECOMANE 2022)
- Pedro Ramon y Cajal Ramo, Claudia Castillo Arias, Jorge Carlos Manzanares Martínez, Jorge Maestre Vidal:
A Revisitation of Clausewitz's Thinking from the Cyber Situational Awareness Perspective. 431-448 - Antonio Portilla-Figueras, Salvador Llopis Sánchez, Silvia Jiménez-Fernández, Sancho Salcedo-Sanz:
Examining 5G Technology-Based Applications for Military Communications. 449-465 - Juan León Murillo, Marco Antonio Sotelo Monge, Víctor A. Villagrá:
Design of a Validation Model of the Cognitive State in Military Operations in Cyberspace. 466-481 - Inés Hernández San Román, Marco Antonio Sotelo Monge, Víctor A. Villagrá:
Design and Validation of a Threat Model Based on Cyber Kill Chain Applied to Human Factors. 482-499 - Elisa Rojas, Diego Lopez-Pajares, Joaquin Alvarez-Horcajo, Salvador Llopis Sánchez:
The Cloud Continuum for Military Deployable Networks: Challenges and Opportunities. 500-519
1st International Workshop on Election Infrastructure Security (EIS 2022)
- Floyd Everest, Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model. 525-540 - Philip B. Stark:
Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits. 541-554 - Michael Kirsten, Melanie Volkamer, Bernhard Beckert:
Why Is Online Voting Still Largely a Black Box? 555-567 - Kamryn Parker, Hoda Mehrpouyan, Jaclyn J. Kettler, Chad Houck:
Connecting Incident Reporting Infrastructure to Election Day Proceedings. 568-584 - Ardita Driza Maurer, Melanie Volkamer, Robert Krimmer:
Council of Europe Guidelines on the Use of ICT in Electoral Processes. 585-599
1st International Workshop on System Security Assurance (SecAssure 2022)
- Shao-Fang Wen, Basel Katt:
SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation. 605-624 - Peeter Laud, Jelizaveta Vakarjuk:
A Comparison-Based Methodology for the Security Assurance of Novel Systems. 625-644 - Fateme Hashemi Chaleshtori, Indrakshi Ray:
Automation of Vulnerability Information Extraction Using Transformer-Based Language Models. 645-665 - Sébastien Dupont, Artsiom Yautsiukhin, Guillaume Ginis, Giacomo Iadarola, Stefano Fagnano, Fabio Martinelli, Christophe Ponsard, Axel Legay, Philippe Massonet:
Product Incremental Security Risk Assessment Using DevSecOps Practices. 666-685 - Eric Lesiuta, Victor Bandur, Mark Lawford:
SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability Detection. 686-704
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.