Computer Security. ESORICS 2022 International Workshops CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers
Chapter(s) 5, 10, 11, and 14 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2023, 2023
|
Edition: | 1st ed. 2023 |
Series: | Lecture Notes in Computer Science
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- CyberICPS 2022
- Towards Comprehensive Modeling of CPSs to Discover and Study Interde-pendencies
- Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study
- Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles
- Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Ef-fectiveness of Existing Security Solutions
- The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP
- Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness
- A Framework for Developing Tabletop cybersecurity Exercies
- A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems
- SECPRE 2022
- OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security
- Measuring the adoption of TLS Encrypted Client Hello extension and its forebearin the wild.-SPOSE 2022
- SPOSE 2022
- Coverage-guided fuzzing of embedded systems leveraging hardware tracing
- Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research
- Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture
- A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
- CDT& SECOMANE 2022
- A Revisitation of Clausewitz’s thinking from the Cyber Situational Aware-ness perspective
- Examining 5G technology-based applications for military communications
- Design of a validation model of the cognitive state in military operations in cyberspace
- Design and validation of a threat model based on “Cyber Kill Chain” applied to human factors
- The cloud continuum for military deployable networks: challenges and op-portunities
- EIS 2022
- Ballot-Polling Audits of Instant-Runoff Voting Elections with a DirichletTree Model
- Non(c)esuch Ballot-Level Comparison Risk-Limiting Audits
- Influencing Factors for Users' Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study
- Towards a Security Impact Analysis Framework: A Risk-based and MITRE Attack Approach
- Data Protection Officers’ Perspectives on Privacy Challenges in Digital Eco-systems
- Rebooting IT-Security – How Organisations Can Encourage and Sustain Se-cure Behaviours
- CPS4CIP 2022
- Resilience, Risk Assessment, and Secure communications
- Towards Reverse Engineering of Industrial Physical Processes
- Solutions for Protecting the Space Ground Segments: From risk assessment to emergency response
- Modelling and Simulation of Railway Networks for Resilience Analysis
- HoneyChart: Automated Honeypot Management Over Kubernetes
- ComSEC: Secure communications for baggage handling systems
- Methodology for resilience assessment for rail infrastructure considering cyber-physical threats
- Cyber-Physical Systems Security, Standards, and Datasets
- Election Infrastructure
- Why is Online Voting Still Largely a Black Box?
- Connecting Incident Reporting Infrastructure to Election Day Proceedings
- Council of Europe Guidelines on the Use of ICT in Electoral Processes
- Security Assurance Methodology
- SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation
- A Comparison-Based Methodology for the Security Assurance of Novel Systems
- Security Assurance Technique
- Automation of Vulnerability Information Extraction using TransformerBased Language Models
- Product Incremental Security Risk Assessment using DevSecOps Practices
- SLIME: State Learning In the Middle of Everything for Tool-Assisted Vulnerability Detection