Computer Security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers

This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third Intern...

Full description

Bibliographic Details
Other Authors: Katsikas, Sokratis (Editor), Cuppens, Frédéric (Editor), Cuppens, Nora (Editor), Lambrinoudakis, Costas (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2020, 2020
Edition:1st ed. 2020
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • CyberICPS Workshop
  • Integrated Analysis of Safety and Security Hazards in Automotive Systems
  • Attack Path Analysis for Cyber-Physical Systems
  • Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System
  • A Survey of Cryptography-Based Authentication for Smart Grid Communication
  • Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment
  • IoT Vulnerability Scanning: A State of the Art
  • Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems
  • Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts
  • SECPRE Workshop
  • Definition and Verification of Security Configurations of Cyber-Physical Systems
  • GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations
  • Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems
  • Identifying Implicit Vulnerabilities through Personas as Goal Models
  • ADIoT Workshop
  • Cooperative Speed Estimation of an RF Jammerin Wireless Vehicular Networks
  • Extended Abstract: Towards Physical-LayerAuthentication for Backscatter Devices
  • P2Onto: Making Privacy Policies Transparent
  • Extended Abstract - Transformers: Intrusion Detection Data In Disguise