Computer security = ESORICS 2022 Int...
European Symposium on Research in Computer Security (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Computer security = ESORICS 2022 International Workshops : CDT&SECOMANE, CPS4CIP, CyberICPS, EIS, SecAssure, SECPRE, and SPOSE, Copenhagen, Denmark, September 26-30, 2022 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Computer security/ edited by Sokratis Katsikas ... [et al.].
    Reminder of title: ESORICS 2022 International Workshops : CDT&SECOMANE, CPS4CIP, CyberICPS, EIS, SecAssure, SECPRE, and SPOSE, Copenhagen, Denmark, September 26-30, 2022 : revised selected papers /
    other author: Katsikas, Sokratis K.
    corporate name: European Symposium on Research in Computer Security
    Published: Cham :Springer International Publishing : : 2023.,
    Description: xi, 707 p. :ill., digital ;24 cm.
    [NT 15003449]: CyberICPS 2022 -- Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies -- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study -- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles -- Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions -- The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP -- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness -- A Framework for Developing Tabletop cybersecurity Exercies -- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems -- SECPRE 2022 -- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security -- Measuring the adoption of TLS Encrypted Client Hello extension and its forebear in the wild -- SPOSE 2022 -- SPOSE 2022 -- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study -- Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach -- Data Protection Officers' Perspectives on Privacy Challenges in Digital Eco-systems -- Rebooting IT-Security - How Organisations Can Encourage and Sustain Se-cure Behaviours -- CPS4CIP 2022 -- Resilience, Risk Assessment, and Secure communications -- Towards Reverse Engineering of Industrial Physical Processes -- Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response -- Modelling and Simulation of Railway Networks for Resilience Analysis -- HoneyChart: Automated Honeypot Management Over Kubernetes -- ComSEC: Secure communications for baggage handling systems -- Methodology for resilience assessment for rail infrastructure considering cyber-physical threats -- Cyber-Physical Systems Security, Standards, and Datasets -- Coverage-guided fuzzing of embedded systems leveraging hardware tracing -- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research -- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture -- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case -- CDT& SECOMANE 2022 -- A Revisitation of Clausewitz's thinking from the Cyber Situational Aware-ness perspective -- Examining 5G technology-based applications for military communications -- Design of a validation model of the cognitive state in military operations in cyberspace -- Design and validation of a threat model based on "Cyber Kill Chain" applied to human factors -- The cloud continuum for military deployable networks: challenges and op-portunities -- EIS 2022 -- Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council of Europe Guidelines on the Use of ICT in Electoral Processes -- Security Assurance Methodology -- SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation -- A Comparison-Based Methodology for the Security Assurance of Novel Systems -- Security Assurance Technique -- Automation of Vulnerability Information Extraction using TransformerBased Language Models -- Product Incremental Security Risk Assessment using DevSecOps Practices -- SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-25460-4
    ISBN: 9783031254604
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9451941 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E87 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login