


default search action
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: Luxembourg
- Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Weizhi Meng
, Steven Furnell
, Joaquín García-Alfaro
:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5
CyberICPS Workshop
- Jonguk Kim, Jeong-Han Yun, HyoungChun Kim:
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. 3-18 - Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro
:
Reflective Attenuation of Cyber-Physical Attacks. 19-34 - Athanasios Rizos
, Daniel Bastos
, Andrea Saracino, Fabio Martinelli:
Distributed UCON in CoAP and MQTT Protocols. 35-52 - Nikolaos Pitropakis, Marios Logothetis, Gennady L. Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis
:
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. 53-68 - Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation. 69-85 - Damjan Gogic, Bojan Jelacic, Imre Lendák
:
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs. 86-97 - Amna Altaf, Shamal Faily, Huseyin Dogan
, Alexios Mylonas
, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. 98-107
SECPRE Workshop
- Jan Willemson:
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. 111-121 - Eleni-Laskarina Makri
, Zafeiroula Georgiopoulou, Costas Lambrinoudakis
:
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics. 122-139 - Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis
, Michalis Pavlidis
:
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems. 140-158 - Thanos Papaioannou
, Aggeliki Tsohou
, Maria Karyda:
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns. 159-180 - Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis
:
GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers. 181-194 - Dimitri Van Landuyt
, Laurens Sion
, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. 195-203 - Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras
, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. 204-223 - Mohammad Heydari, Alexios Mylonas
, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. 224-237 - Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. 238-257
SPOSE Workshop
- Yang Liu
, Andrew Simpson
:
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. 261-278 - Jan Zibuschka:
Analysis of Automation Potentials in Privacy Impact Assessment Processes. 279-286 - Sebastian Pape
, Jelena Stankovic:
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. 287-306 - Hugh D. Lester
, Martin J. Miller:
Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture Change. 307-322
ADIoT Workshop
- Deepak Kumar Dalai
:
A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme. 325-340 - Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa
:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. 341-359 - Ali Hariri
, Nicolas Giannelos, Budi Arief
:
Selective Forwarding Attack on IoT Home Security Kits. 360-373 - Philokypros P. Ioulianou
, Vassilios G. Vassilakis
:
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things. 374-390 - Dennis Tatang, Tim Suurland, Thorsten Holz:
Study of DNS Rebinding Attacks on Smart Home Devices. 391-401 - Evgenia Novikova, Mikhail Bestuzhev
, Igor V. Kotenko
:
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. 402-418 - Matthias Schäfer, Carolina Nogueira, Jens B. Schmitt, Vincent Lenders
:
Secure Location Verification: Why You Want Your Verifiers to Be Mobile. 419-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.