Amazon cover image
Image from Amazon.com

Computer Security. ESORICS 2022 International Workshops [electronic resource] : CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 13785Publisher: Cham : Springer International Publishing : Imprint: Springer, 2023Edition: 1st ed. 2023Description: XI, 707 p. 201 illus., 135 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031254604
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.824 23
LOC classification:
  • QA268
Online resources:
Contents:
CyberICPS 2022 -- Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies -- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study -- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles -- Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions -- The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP -- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness -- A Framework for Developing Tabletop cybersecurity Exercies -- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems -- SECPRE 2022 -- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security -- Measuring the adoption of TLS Encrypted Client Hello extension and its forebearin the wild.-SPOSE 2022 -- SPOSE 2022 -- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study -- Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach -- Data Protection Officers’ Perspectives on Privacy Challenges in Digital Eco-systems -- Rebooting IT-Security – How Organisations Can Encourage and Sustain Se-cure Behaviours -- CPS4CIP 2022 -- Resilience, Risk Assessment, and Secure communications -- Towards Reverse Engineering of Industrial Physical Processes -- Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response -- Modelling and Simulation of Railway Networks for Resilience Analysis -- HoneyChart: Automated Honeypot Management Over Kubernetes -- ComSEC: Secure communications for baggage handling systems -- Methodology for resilience assessment for rail infrastructure considering cyber-physical threats -- Cyber-Physical Systems Security, Standards, and Datasets -- Coverage-guided fuzzing of embedded systems leveraging hardware tracing -- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research -- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture -- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case -- CDT& SECOMANE 2022 -- A Revisitation of Clausewitz’s thinking from the Cyber Situational Aware-ness perspective -- Examining 5G technology-based applications for military communications -- Design of a validation model of the cognitive state in military operations in cyberspace -- Design and validation of a threat model based on “Cyber Kill Chain” applied to human factors -- The cloud continuum for military deployable networks: challenges and op-portunities -- EIS 2022 -- Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council of Europe Guidelines on the Use of ICT in Electoral Processes -- Security Assurance Methodology -- SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation -- A Comparison-Based Methodology for the Security Assurance of Novel Systems -- Security Assurance Technique -- Automation of Vulnerability Information Extraction using TransformerBased Language Models -- Product Incremental Security Risk Assessment using DevSecOps Practices -- SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection.
In: Springer Nature eBookSummary: Chapter(s) 5, 10, 11, and 14 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

CyberICPS 2022 -- Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies -- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study -- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles -- Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions -- The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP -- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness -- A Framework for Developing Tabletop cybersecurity Exercies -- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems -- SECPRE 2022 -- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security -- Measuring the adoption of TLS Encrypted Client Hello extension and its forebearin the wild.-SPOSE 2022 -- SPOSE 2022 -- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study -- Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach -- Data Protection Officers’ Perspectives on Privacy Challenges in Digital Eco-systems -- Rebooting IT-Security – How Organisations Can Encourage and Sustain Se-cure Behaviours -- CPS4CIP 2022 -- Resilience, Risk Assessment, and Secure communications -- Towards Reverse Engineering of Industrial Physical Processes -- Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response -- Modelling and Simulation of Railway Networks for Resilience Analysis -- HoneyChart: Automated Honeypot Management Over Kubernetes -- ComSEC: Secure communications for baggage handling systems -- Methodology for resilience assessment for rail infrastructure considering cyber-physical threats -- Cyber-Physical Systems Security, Standards, and Datasets -- Coverage-guided fuzzing of embedded systems leveraging hardware tracing -- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research -- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture -- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case -- CDT& SECOMANE 2022 -- A Revisitation of Clausewitz’s thinking from the Cyber Situational Aware-ness perspective -- Examining 5G technology-based applications for military communications -- Design of a validation model of the cognitive state in military operations in cyberspace -- Design and validation of a threat model based on “Cyber Kill Chain” applied to human factors -- The cloud continuum for military deployable networks: challenges and op-portunities -- EIS 2022 -- Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council of Europe Guidelines on the Use of ICT in Electoral Processes -- Security Assurance Methodology -- SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation -- A Comparison-Based Methodology for the Security Assurance of Novel Systems -- Security Assurance Technique -- Automation of Vulnerability Information Extraction using TransformerBased Language Models -- Product Incremental Security Risk Assessment using DevSecOps Practices -- SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection.

Chapter(s) 5, 10, 11, and 14 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in