000 06267nam a22007335i 4500
001 978-3-030-64330-0
003 DE-He213
005 20240730175023.0
007 cr nn 008mamaa
008 201216s2020 sz | s |||| 0|eng d
020 _a9783030643300
_9978-3-030-64330-0
024 7 _a10.1007/978-3-030-64330-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aComputer Security
_h[electronic resource] :
_bESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers /
_cedited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXVIII, 265 p. 75 illus., 50 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12501
505 0 _aCyberICPS Workshop -- Integrated Analysis of Safety and Security Hazards in Automotive Systems -- Attack Path Analysis for Cyber-Physical Systems -- Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System -- A Survey of Cryptography-Based Authentication for Smart Grid Communication -- Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment -- IoT Vulnerability Scanning: A State of the Art -- Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems -- Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts -- SECPRE Workshop -- Definition and Verification of Security Configurations of Cyber-Physical Systems -- GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations -- Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems -- Identifying Implicit Vulnerabilities through Personas as Goal Models -- ADIoT Workshop -- Cooperative Speed Estimation of an RF Jammerin Wireless Vehicular Networks -- Extended Abstract: Towards Physical-LayerAuthentication for Backscatter Devices -- P2Onto: Making Privacy Policies Transparent -- Extended Abstract - Transformers: Intrusion Detection Data In Disguise.
520 _aThis book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
650 0 _aData protection.
_97245
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aSoftware engineering.
_94138
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Engineering and Networks.
_9115117
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Engineering and Networks.
_9115117
650 2 4 _aSoftware Engineering.
_94138
700 1 _aKatsikas, Sokratis.
_eeditor.
_0(orcid)
_10000-0003-2966-9683
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115118
700 1 _aCuppens, Frédéric.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115119
700 1 _aCuppens, Nora.
_eeditor.
_0(orcid)
_10000-0001-8792-0413
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115120
700 1 _aLambrinoudakis, Costas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115121
700 1 _aKalloniatis, Christos.
_eeditor.
_0(orcid)
_10000-0002-8844-2596
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115122
700 1 _aMylopoulos, John.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115123
700 1 _aAntón, Annie.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115124
700 1 _aGritzalis, Stefanos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115125
700 1 _aMeng, Weizhi.
_eeditor.
_0(orcid)
_10000-0003-4384-5786
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115126
700 1 _aFurnell, Steven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115127
710 2 _aSpringerLink (Online service)
_9115128
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030643294
776 0 8 _iPrinted edition:
_z9783030643317
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12501
_9115129
856 4 0 _uhttps://doi.org/10.1007/978-3-030-64330-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89743
_d89743