


default search action
CyberICPS/SECPRE@ESORICS 2017: Oslo, Norway
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2
Protecting Industrial Control and Cyber-Physical Systems
- Vasily Mikhalev, Laurent Gomez, Frederik Armknecht
, José Márquez:
Towards End-to-End Data Protection in Low-Power Networks. 3-18 - Vincent Raes, Jan Vossaert, Vincent Naessens:
Development of an Embedded Platform for Secure CPS Services. 19-34 - Antonio La Marra, Fabio Martinelli, Paolo Mori
, Athanasios Rizos
, Andrea Saracino
:
Introducing Usage Control in MQTT. 35-43
Threats, Vulnerabilities and Risks
- Katja Tuma
, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. 47-62 - Bastien Sultan
, Fabien Dagnat, Caroline Fontaine:
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System. 63-76 - Bojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic, Sebastijan Stoja:
STRIDE to a Secure Smart Grid in a Hybrid Cloud. 77-90
Cyber Attacks in Industrial Control and Cyber-Physical Systems
- Amit Kleinmann, Ori Amichay, Avishai Wool
, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. 93-109 - Naman Govil, Anand Agrawal, Nils Ole Tippenhauer
:
On Ladder Logic Bombs in Industrial Control Systems. 110-126 - Eyasu Getahun Chekole
, John Henry Castellanos
, Martín Ochoa
, David K. Y. Yau:
Enforcing Memory Safety in Cyber-Physical Systems. 127-144
Detecting Attacks in Industrial Control and Cyber-Physical Systems
- Kirsi Helkala
, Benjamin J. Knox, Øyvind Jøsok, Ricardo Gregorio Lugo
, Stefan Sütterlin
, Geir Olav Dyrkolbotn, Nils Kalstad Svendsen:
Supporting the Human in Cyber Defence. 147-162 - Ambika Shrestha Chitrakar, Slobodan Petrovic:
CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. 163-176 - Rizwan Qadeer, Carlos Murguia
, Chuadhry Mujeeb Ahmed
, Justin Ruths:
Multistage Downstream Attack Detection in a Cyber Physical System. 177-185
Security and Privacy Requirements Assurance and Evaluation
- Majed Alshammari, Andrew Simpson
:
A UML Profile for Privacy-Aware Data Lifecycle Models. 189-209 - Vasiliki Diamantopoulou, Michalis Pavlidis
, Haralambos Mouratidis:
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation. 210-225
Security Requirements Elicitation and Modelling
- Vivien M. Rooney
, Simon N. Foley
:
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation. 229-249 - Mohammad Torabi Dashti
, Sasa Radomirovic
:
An Anti-pattern for Misuse Cases. 250-261 - Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish
:
Decision-Making in Security Requirements Engineering with Constrained Goal Models. 262-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.