


default search action
20th ARES 2025: Ghent, Belgium - Workshops Part I
- Bart Coppens  , Bruno Volckaert , Bruno Volckaert , Vincent Naessens , Vincent Naessens , Bjorn De Sutter , Bjorn De Sutter : :
 Availability, Reliability and Security - ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15994, Springer 2025, ISBN 978-3-032-00629-5
Proceedings of the First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025)
- Francesco Marchiori  , Denis Donadel , Denis Donadel , Alessandro Brighente , Alessandro Brighente , Mauro Conti , Mauro Conti : :
 Profiling Electric Vehicles via Early Charging Voltage Patterns. 5-22
- Matteo Lupinacci  , Francesco Blefari , Francesco Blefari , Francesco Romeo , Francesco Romeo , Francesco Aurelio Pironti , Francesco Aurelio Pironti , Angelo Furfaro , Angelo Furfaro : :
 ARCeR: An Agentic RAG for the Automated Definition of Cyber Ranges. 23-40
- Alberto Giaretta, Hadi Banaee: 
 Edge Virtual Fence for Smart Airport Physical Security: A Case Study. 41-54
- Mohammed Alquliti  , Erisa Karafili , Erisa Karafili , BooJoong Kang , BooJoong Kang : :
 Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics. 55-72
- Zanis Ali Khan  , Aayush Garg , Aayush Garg , Qiang Tang , Qiang Tang : :
 A Multi-dataset Evaluation of Models for Automated Vulnerability Repair. 73-87
- Javier Martínez Llamas  , Matthias Van Hoof, Davy Preuveneers , Matthias Van Hoof, Davy Preuveneers , Wouter Joosen: , Wouter Joosen:
 Adversarial Robustness of Machine Learning-Based Access Control. 88-105
- Wissam Salhab, Darine Ameyed, Hamid Mcheick, Fehmi Jaafar: 
 Towards Robust Artificial Intelligence: Self-supervised Learning Approach for Out-of-Distribution Detection. 106-121
Proceedings of the Eighth International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2025)
- Leonie Reichert, Nicolas Coppik  , Sören Finster , Sören Finster : :
 Performance Evaluation of Quantum-Resistant Algorithms on Industrial Embedded Systems. 127-148
- Alexios Karagiozidis, Martin Gergeleit: 
 TADFICS: A Threat-Aware Digital Forensics Data Model for ICS. 149-171
- Hoda Mehrpouyan  : :
 A Robust Hybrid Framework Combining Deductive Temporal Logic and Machine Learning for Fault and Cyber-Attack Detection in the Tennessee Eastman Process. 172-190
- Nowshaba Jeelani Wani, Dirk Pesch, Utz Roedig: 
 KIDS: Intrusion Detection for Industrial Control Systems. 191-208
Proceedings of the First Workshop on Sustainable Security and Awareness For Next Generation Infrastructures (SAFER 2025)
- Roosa Risto, Mohit Sethi  , Mika Katara: , Mika Katara:
 Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies. 213-229
- Thor Kristoffersen  : :
 Dynamic Access Policies for Energy Cost Management of Microservices. 230-247
- Silvia Lucia Sanna  , Diego Soi , Diego Soi , Davide Maiorca , Davide Maiorca , Giorgio Giacinto , Giorgio Giacinto : :
 Are Trees Really Green? A Detection Approach of IoT Malware Attacks. 248-265
- Francesco Settanni  , Giuseppe Lisena, Cataldo Basile , Giuseppe Lisena, Cataldo Basile : :
 Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms. 266-284
Proceedings of the Fourth Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025)
- Paul Tavolato, Oliver Eigner, Philipp Kreimel-Haindl, Antonella Santone, Fabio Martinelli, Francesco Mercaldo: 
 A Method for Explainable Anomaly Detection in Substation Networks Through Deep Learning. 289-303
- Ndeye Gagnessiry Ndiaye, Karl Waedt, Nicolas Dejon, Chrystel Gaber, Achilleas Marinakis  , Christos A. Gizelis, Gürkan Gür, Marc Rennhard, Oumayma Zeddini, Jean-Philippe Wary, Dominico Orlando, Claire Loiseaux, Vangelis Photiou, Nikolaos Koulierakis, Vasiliki Danilatou: , Christos A. Gizelis, Gürkan Gür, Marc Rennhard, Oumayma Zeddini, Jean-Philippe Wary, Dominico Orlando, Claire Loiseaux, Vangelis Photiou, Nikolaos Koulierakis, Vasiliki Danilatou:
 Safety and Cybersecurity Under Emerging EU Legislation for Industry: A Use-Case Driven Perspective. 304-321
- Francesco Mercaldo, Paul Tavolato, Antonella Santone, Fabio Martinelli: 
 An Explainable Method for Malware Detection Through Convolutional Neural Networks. 322-339
- Nikolai Puch  , Stefan Dopfer, Leon Birkel: , Stefan Dopfer, Leon Birkel:
 Securing the Additive Manufacturing Process Chain. 340-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














