Computer security = ESORICS 2022 Int...
European Symposium on Research in Computer Security (2022 :)

FindBook      Google Book      Amazon      博客來     
  • Computer security = ESORICS 2022 International Workshops : CDT&SECOMANE, CPS4CIP, CyberICPS, EIS, SecAssure, SECPRE, and SPOSE, Copenhagen, Denmark, September 26-30, 2022 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Computer security/ edited by Sokratis Katsikas ... [et al.].
    其他題名: ESORICS 2022 International Workshops : CDT&SECOMANE, CPS4CIP, CyberICPS, EIS, SecAssure, SECPRE, and SPOSE, Copenhagen, Denmark, September 26-30, 2022 : revised selected papers /
    其他作者: Katsikas, Sokratis K.
    團體作者: European Symposium on Research in Computer Security
    出版者: Cham :Springer International Publishing : : 2023.,
    面頁冊數: xi, 707 p. :ill., digital ;24 cm.
    內容註: CyberICPS 2022 -- Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies -- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study -- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles -- Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions -- The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP -- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness -- A Framework for Developing Tabletop cybersecurity Exercies -- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems -- SECPRE 2022 -- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security -- Measuring the adoption of TLS Encrypted Client Hello extension and its forebear in the wild -- SPOSE 2022 -- SPOSE 2022 -- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study -- Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach -- Data Protection Officers' Perspectives on Privacy Challenges in Digital Eco-systems -- Rebooting IT-Security - How Organisations Can Encourage and Sustain Se-cure Behaviours -- CPS4CIP 2022 -- Resilience, Risk Assessment, and Secure communications -- Towards Reverse Engineering of Industrial Physical Processes -- Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response -- Modelling and Simulation of Railway Networks for Resilience Analysis -- HoneyChart: Automated Honeypot Management Over Kubernetes -- ComSEC: Secure communications for baggage handling systems -- Methodology for resilience assessment for rail infrastructure considering cyber-physical threats -- Cyber-Physical Systems Security, Standards, and Datasets -- Coverage-guided fuzzing of embedded systems leveraging hardware tracing -- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research -- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture -- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case -- CDT& SECOMANE 2022 -- A Revisitation of Clausewitz's thinking from the Cyber Situational Aware-ness perspective -- Examining 5G technology-based applications for military communications -- Design of a validation model of the cognitive state in military operations in cyberspace -- Design and validation of a threat model based on "Cyber Kill Chain" applied to human factors -- The cloud continuum for military deployable networks: challenges and op-portunities -- EIS 2022 -- Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model -- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits -- Election Infrastructure -- Why is Online Voting Still Largely a Black Box? -- Connecting Incident Reporting Infrastructure to Election Day Proceedings -- Council of Europe Guidelines on the Use of ICT in Electoral Processes -- Security Assurance Methodology -- SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation -- A Comparison-Based Methodology for the Security Assurance of Novel Systems -- Security Assurance Technique -- Automation of Vulnerability Information Extraction using TransformerBased Language Models -- Product Incremental Security Risk Assessment using DevSecOps Practices -- SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-25460-4
    ISBN: 9783031254604
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9451941 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E87 2022 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入