Computer Security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third Intern...
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2020, 2020
|
Edition: | 1st ed. 2020 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- CyberICPS Workshop
- Integrated Analysis of Safety and Security Hazards in Automotive Systems
- Attack Path Analysis for Cyber-Physical Systems
- Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System
- A Survey of Cryptography-Based Authentication for Smart Grid Communication
- Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment
- IoT Vulnerability Scanning: A State of the Art
- Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems
- Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts
- SECPRE Workshop
- Definition and Verification of Security Configurations of Cyber-Physical Systems
- GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations
- Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems
- Identifying Implicit Vulnerabilities through Personas as Goal Models
- ADIoT Workshop
- Cooperative Speed Estimation of an RF Jammerin Wireless Vehicular Networks
- Extended Abstract: Towards Physical-LayerAuthentication for Backscatter Devices
- P2Onto: Making Privacy Policies Transparent
- Extended Abstract - Transformers: Intrusion Detection Data In Disguise