


default search action
CyberICPS/SECPRE@ESORICS 2017: Oslo, Norway
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:

Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2
Protecting Industrial Control and Cyber-Physical Systems
- Vasily Mikhalev, Laurent Gomez, Frederik Armknecht

, José Márquez:
Towards End-to-End Data Protection in Low-Power Networks. 3-18 - Vincent Raes, Jan Vossaert, Vincent Naessens:

Development of an Embedded Platform for Secure CPS Services. 19-34 - Antonio La Marra, Fabio Martinelli, Paolo Mori

, Athanasios Rizos
, Andrea Saracino
:
Introducing Usage Control in MQTT. 35-43
Threats, Vulnerabilities and Risks
- Katja Tuma

, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. 47-62 - Bastien Sultan

, Fabien Dagnat, Caroline Fontaine:
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System. 63-76 - Bojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic, Sebastijan Stoja:

STRIDE to a Secure Smart Grid in a Hybrid Cloud. 77-90
Cyber Attacks in Industrial Control and Cyber-Physical Systems
- Amit Kleinmann, Ori Amichay, Avishai Wool

, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. 93-109 - Naman Govil, Anand Agrawal, Nils Ole Tippenhauer

:
On Ladder Logic Bombs in Industrial Control Systems. 110-126 - Eyasu Getahun Chekole

, John Henry Castellanos
, Martín Ochoa
, David K. Y. Yau:
Enforcing Memory Safety in Cyber-Physical Systems. 127-144
Detecting Attacks in Industrial Control and Cyber-Physical Systems
- Kirsi Helkala

, Benjamin J. Knox, Øyvind Jøsok, Ricardo Gregorio Lugo
, Stefan Sütterlin
, Geir Olav Dyrkolbotn, Nils Kalstad Svendsen:
Supporting the Human in Cyber Defence. 147-162 - Ambika Shrestha Chitrakar, Slobodan Petrovic:

CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. 163-176 - Rizwan Qadeer, Carlos Murguia

, Chuadhry Mujeeb Ahmed
, Justin Ruths:
Multistage Downstream Attack Detection in a Cyber Physical System. 177-185
Security and Privacy Requirements Assurance and Evaluation
- Majed Alshammari, Andrew Simpson

:
A UML Profile for Privacy-Aware Data Lifecycle Models. 189-209 - Vasiliki Diamantopoulou, Michalis Pavlidis

, Haralambos Mouratidis:
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation. 210-225
Security Requirements Elicitation and Modelling
- Vivien M. Rooney

, Simon N. Foley
:
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation. 229-249 - Mohammad Torabi Dashti

, Sasa Radomirovic
:
An Anti-pattern for Misuse Cases. 250-261 - Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish

:
Decision-Making in Security Requirements Engineering with Constrained Goal Models. 262-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














